Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings / edited by Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing.

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Bao, Feng (Editor), Ling, San (Editor), Okamoto, Tatsuaki (Editor), Wang, Huaxiong (Editor), Xing, Chaoping (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Series:Security and Cryptology ; 4856
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Signatures
  • Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles
  • A Generic Construction for Universally-Convertible Undeniable Signatures
  • Fast Digital Signature Algorithm Based on Subgraph Isomorphism
  • Efficient ID-Based Digital Signatures with Message Recovery
  • Network Security
  • Achieving Mobility and Anonymity in IP-Based Networks
  • Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
  • Forward-Secure Key Evolution in Wireless Sensor Networks
  • A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations
  • An Intelligent Network-Warning Model with Strong Survivability
  • Running on Karma – P2P Reputation and Currency Systems
  • Secure Keyword Search and Private Information Retrieval
  • Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
  • Extended Private Information Retrieval and Its Application in Biometrics Authentications
  • Public Key Encryption
  • Strongly Secure Certificateless Public Key Encryption Without Pairing
  • Intrusion Detection
  • Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems
  • Email Security
  • How to Secure Your Email Address Book and Beyond
  • Denial of Service Attacks
  • Toward Non-parallelizable Client Puzzles
  • Authentication
  • Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authentication.