Jianying Zhou,
Moti Yung,
Feng Bao:
Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings. Lecture Notes in Computer Science 3989,
2006, ISBN
3-540-34703-8
Intrusion Avoidance and Detection
Jianhua Yang,
Yongzhong Zhang:
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. 18-32
Cryptographic Applications
Ahto Buldas,
Sven Laur:
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? 50-65
DoS:
Attacks and Countermeasures
Security of Limited Devices
Authentication and Web Security
Ad Hoc and Sensor Network Security
Nitesh Saxena:
Public Key Cryptography Sans Certificates in Ad Hoc Networks. 375-389
Cryptographic Constructions
maintained by

, founded at
