default search action
3rd ACNS 2005: New York, NY, USA
- John Ioannidis, Angelos D. Keromytis, Moti Yung:
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3531, 2005, ISBN 3-540-26223-7 - Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor:
Two-Server Password-Only Authenticated Key Exchange. 1-16 - Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon:
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. 17-32 - Raphael Chung-Wei Phan, Bok-Min Goi:
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. 33-39 - Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. 40-55 - John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee:
A Traitor Tracing Scheme Based on RSA for Fast Decryption. 56-74 - Jin Wook Byun, Dong Hoon Lee:
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. 75-90 - Virgil Griffith, Markus Jakobsson:
Messin' with Texas Deriving Mother's Maiden Names Using Public Records. 91-103 - Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji:
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. 104-121 - Wenliang Du, Michael T. Goodrich:
Searching for High-Value Rare Events with Uncheatable Grid Computing. 122-137 - Thomas Pornin, Julien P. Stern:
Digital Signatures Do Not Guarantee Exclusive Ownership. 138-150 - Vladimir Shpilrain, Alexander Ushakov:
Thompson's Group and Public Key Cryptography. 151-163 - Jintai Ding, Dieter Schmidt:
Rainbow, a New Multivariable Polynomial Signature Scheme. 164-175 - Martin Boesgaard, Thomas Christensen, Erik Zenner:
Badger - A Fast and Provably Secure MAC. 176-191 - Abdulrahman Alharby, Hideki Imai:
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. 192-205 - Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia:
Indexing Information for Data Forensics. 206-221 - Zhuowei Li, Amitabha Das, Jianying Zhou:
Model Generalization and Its Implications on Intrusion Detection. 222-237 - Gene Itkis, Robert McNerney, Scott Russell:
Intrusion-Resilient Secure Channels. 238-253 - Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval:
Optimal Asymmetric Encryption and Signature Paddings. 254-268 - SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. 269-284 - Benoît Libert, Jean-Jacques Quisquater:
Identity Based Encryption Without Redundancy. 285-300 - Jiangtao Li, Ninghui Li:
OACerts: Oblivious Attribute Certificates. 301-317 - Lan Nguyen, Reihaneh Safavi-Naini:
Dynamic k-Times Anonymous Authentication. 318-333 - Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Efficient Anonymous Roaming and Its Security Analysis. 334-349 - Markus Jakobsson, Liu Yang:
Quantifying Security in Hybrid Cellular Networks. 350-363 - Flavio D. Garcia, Jaap-Henk Hoepman:
Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. 364-377 - Michael K. Reiter, XiaoFeng Wang, Matthew K. Wright:
Building Reliable Mix Networks with Fair Exchange. 378-392 - Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette:
SCARE of the DES. 393-406 - Boris Skoric, Pim Tuyls, W. Ophey:
Robust Key Extraction from Physical Uncloneable Functions. 407-422 - Yih-Chun Hu, Markus Jakobsson, Adrian Perrig:
Efficient Constructions for One-Way Hash Chains. 423-441 - Yan-Cheng Chang, Michael Mitzenmacher:
Privacy Preserving Keyword Searches on Remote Encrypted Data. 442-455 - Hsiao-Ying Lin, Wen-Guey Tzeng:
An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. 456-466 - Jens Groth:
Non-interactive Zero-Knowledge Arguments for Voting. 467-482 - Rui Zhang, Jun Furukawa, Hideki Imai:
Short Signature and Universal Designated Verifier Signature Without Random Oracles. 483-498 - Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. 499-512 - Benoît Chevallier-Mames:
New Signature Schemes with Coupons and Tight Reduction. 513-528
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.