


default search action
4. CANS 2005: Xiamen, China
- Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li:

Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings. Lecture Notes in Computer Science 3810, Springer 2005, ISBN 3-540-30849-0
Cryptanalysis
- Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang:

The Second-Preimage Attack on MD4. 1-12 - Xinyi Huang, Willy Susilo

, Yi Mu, Futai Zhang:
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. 13-25 - Haiyong Bao, Zhenfu Cao

, Haifeng Qian:
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. 26-34 - Wen Tao Zhu:

Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. 35-48 - Kyung-Ah Shim, Seung-Hyun Seo

:
Security Analysis of Password-Authenticated Key Agreement Protocols. 49-58
Intrusion Detection and Viruses
- Tao Li, XiaoJie Liu, Hongbin Li:

An Immune-Based Model for Computer Virus Detection. 59-71 - Tao Li, XiaoJie Liu, Hongbin Li:

A New Model for Dynamic Intrusion Detection. 72-84 - Ruo Ando, Yoshiyasu Takefuji

:
Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection. 85-95 - Wei Lu

, Issa Traoré:
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time. 96-109
Authentication and Signature
- Jing Xu, Zhenfeng Zhang, Dengguo Feng:

ID-Based Aggregate Signatures from Bilinear Pairings. 110-119 - Zhenjie Huang

, Kefei Chen, Yumin Wang:
Efficient Identity-Based Signatures and Blind Signatures. 120-133 - Chong-zhi Gao, Zheng-an Yao:

How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. 134-146 - Eun-Jun Yoon, Kee-Young Yoo:

New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. 147-160
Signcryption
- Qin Wang, Zhenfu Cao

:
Two Proxy Signcryption Schemes from Bilinear Pairings. 161-171 - Yuan Zhou, Zhenfu Cao

, Rongxing Lu:
Constructing Secure Warrant-Based Proxy Signcryption Schemes. 172-185
E-mail Security
- Stelvio Cimato

, Clemente Galdi
, Raffaella Giordano, Barbara Masucci
, Gildo Tomasco:
Design and Implementation of an Inline Certified E-mail Service. 186-199 - Zhenfeng Zhang, Jing Xu, Dengguo Feng:

Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. 200-210
Cryptosystems
- Yuh-Hua Hu, Lih-Chung Wang, Chun-yen Chou, Feipei Lai:

Similar Keys of Multivariate Quadratic Public Key Cryptosystems. 211-222 - Fanyu Kong, Daxing Li:

A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. 223-235 - Pinhui Ke, Tailin Liu, Qiao-Yan Wen:

Constructions of Almost Resilient Functions. 236-246
Privacy and Tracing
- Kun Peng, Ed Dawson

, Juanma González Nieto, Eiji Okamoto, Javier López
:
A Novel Method to Maintain Privacy in Mobile Agent Applications. 247-260 - Lasse Øverlier, Tønnes Brekne, André Årnes:

Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. 261-273
Information Hiding
- Limin Gu, Yanmei Fang, Jiwu Huang:

Revaluation of Error Correcting Coding in Watermarking Channel. 274-287
Firewalls, Denial of Service and DNS Security
- Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese:

On the Performance and Analysis of DNS Security Extensions. 288-303 - Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo

:
On Securing RTP-Based Streaming Content with Firewalls. 304-319 - Yang Xiang

, Wanlei Zhou
:
Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. 320-333
Trust Management
- Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao:

Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. 334-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














