


default search action
6th ACNS 2008: New York, NY, USA
- Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung:

Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Lecture Notes in Computer Science 5037, 2008, ISBN 978-3-540-68913-3 - Liang Xie, Hui Song, Sencun Zhu:

On the Effectiveness of Internal Patching Against File-Sharing Worms. 1-20 - Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos:

Peeking Through the Cloud: DNS-Based Estimation and Its Applications. 21-38 - Angelos Stavrou

, Michael E. Locasto, Angelos D. Keromytis:
Pushback for Overlay Networks: Protecting Against Malicious Insiders. 39-54 - Patrick P. Tsang, Sean W. Smith:

PPAA: Peer-to-Peer Anonymous Authentication. 55-74 - Joonsang Baek

, Jianying Zhou
, Feng Bao:
Generic Constructions of Stateful Public Key Encryption and Their Applications. 75-93 - Man Ho Au

, Qiong Huang, Joseph K. Liu
, Willy Susilo
, Duncan S. Wong, Guomin Yang
:
Traceable and Retrievable Identity-Based Encryption. 94-110 - Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta:

Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. 111-129 - Somitra Kumar Sanadhya

, Palash Sarkar:
Attacking Reduced Round SHA-256. 130-143 - Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen:

Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. 144-155 - Yevgeniy Dodis, Prashant Puniya:

Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. 156-173 - Macià Mut Puigserver, Magdalena Payeras-Capellà

, Josep Lluís Ferrer-Gomila
, Llorenç Huguet i Rotger:
Replay Attack in a Fair Exchange Protocol. 174-187 - Marina Blanton

:
Improved Conditional E-Payments. 188-206 - Sébastien Canard, Aline Gouget:

Anonymity in Transferable E-cash. 207-223 - Jin Li, Kwangjo Kim, Fangguo Zhang

, Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures. 224-241 - Jintai Ding

, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng:
New Differential-Algebraic Attacks and Reparametrization of Rainbow. 242-257 - Sébastien Canard, Fabien Laguillaumie, Michel Milhau:

TrapdoorSanitizable Signatures and Their Application to Content Protection. 258-276 - David Pointcheval

, Sébastien Zimmer:
Multi-factor Authenticated Key Exchange. 277-295 - Marek Klonowski, Miroslaw Kutylowski, Anna Lauks

:
Repelling Detour Attack Against Onions with Re-encryption. 296-308 - John C. Mitchell, Arnab Roy, Paul D. Rowe, Andre Scedrov

:
Analysis of EAP-GPSK Authentication Protocol. 309-327 - Ramnath Prasad, Nitesh Saxena:

Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns. 328-345 - Ghaith Hammouri, Berk Sunar:

PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. 346-365 - Vladimir Shpilrain, Alexander Ushakov

:
An Authentication Scheme Based on the Twisted Conjugacy Problem. 366-372 - Nikita Borisov

, Soumyadeb Mitra:
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. 373-391 - Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen:

A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. 392-410 - Pierre-Alain Fouque

, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer:
On the Security of the CCM Encryption Mode and of a Slight Variant. 411-428 - Brian King:

wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. 429-445 - David Canright, Lejla Batina:

A Very Compact "Perfectly Masked" S-Box for AES. 446-459 - Frank Stajano, Daniel Cvrcek, Matt Lewis:

Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. 460-478 - Khaled Ouafi, Raphael C.-W. Phan

:
Traceable Privacy of Recent Provably-Secure RFID Protocols. 479-489 - Mike Burmester, Breno de Medeiros:

The Security of EPC Gen2 Compliant RFID Protocols. 490-506

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














