


default search action
5th ACNS 2007: Zhuhai, China
- Jonathan Katz, Moti Yung:

Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings. Lecture Notes in Computer Science 4521, Springer 2007, ISBN 978-3-540-72737-8
Signature Schemes I
- Qiong Huang, Duncan S. Wong, Yiming Zhao:

Generic Transformation to Strongly Unforgeable Signatures. 1-17 - Xiaofeng Chen, Fangguo Zhang

, Willy Susilo
, Yi Mu:
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. 18-30 - Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume:

Merkle Signatures with Virtually Unlimited Signature Capacity. 31-45
Computer and Network Security
- Diana von Bidder, David A. Basin, Germano Caronni:

Midpoints Versus Endpoints: From Protocols to Firewalls. 46-64 - Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo

:
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. 65-86 - Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng

:
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. 87-103
Cryptanalysis
- Xuyun Nie, Lei Hu, Jintai Ding

, Jianyu Li, John Wagner:
Cryptanalysis of the TRMC-4 Public Key Cryptosystem. 104-115 - Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen:

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. 116-128 - Bahador Bakhshi, Babak Sadeghiyan:

A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA. 129-140 - Stefan Tillich, Christoph Herbst, Stefan Mangard

:
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. 141-157
Group-Oriented Security
- Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won:

Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. 158-176 - Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu:

Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. 177-193 - Philip Zigoris, Hongxia Jin:

Bayesian Methods for Practical Traitor Tracing. 194-206
Cryptographic Protocols
- Sven Laur, Helger Lipmaa:

A New Protocol for Conditional Disclosure of Secrets and Its Applications. 207-225 - Ronghua Li, Chuankun Wu:

An Unconditionally Secure Protocol for Multi-Party Set Intersection. 226-236 - Keith B. Frikken:

Privacy-Preserving Set Union. 237-252
Anonymous Authentication
- Jiangtao Li, Ninghui Li, Rui Xue:

Universal Accumulators with Efficient Nonmembership Proofs. 253-269 - Stanislaw Jarecki, Xiaomin Liu:

Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. 270-287
Identity-Based Cryptography
- Matthew Green, Giuseppe Ateniese:

Identity-Based Proxy Re-encryption. 288-306 - Guomin Yang

, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang:
A More Natural Way to Construct Identity-Based Identification Schemes. 307-322 - Rui Zhang:

Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. 323-339 - Chunxiang Gu, Yuefei Zhu, Yonghui Zheng:

Certified E-Mail Protocol in the ID-Based Setting. 340-353
Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks
- Roberto Tamassia, Nikos Triandopoulos:

Efficient Content Authentication in Peer-to-Peer Networks. 354-372 - Fagen Li, Yupu Hu, Chuanrong Zhang:

An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. 373-384 - Ratna Dutta, Ee-Chien Chang

, Sourav Mukhopadhyay:
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. 385-400 - Patrick Schaller, Srdjan Capkun, David A. Basin:

BAP: Broadcast Authentication Using Cryptographic Puzzles. 401-419
Efficient Implementation
- Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi:

Compressed XTR. 420-431 - Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park:

Sliding Window Method for NTRU. 432-442
Signature Schemes II
- Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee:

Efficient Certificateless Signature Schemes. 443-458 - Wun-She Yap, Sherman S. M. Chow

, Swee-Huay Heng, Bok-Min Goi:
Security Mediated Certificateless Signatures. 459-477 - Laila El Aimani

, Damien Vergnaud:
Gradually Convertible Undeniable Signatures. 478-496

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














