Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004,
User Rating: Be the first one!
Author: ACNS 2004 (2nd : 2004 : Yellow Mountain, China), Jakobsson, Markus, Yung, Moti, Zhou, Jianying, SpringerLink (Online service)
Added by: sketch
Added Date: 2015-12-29
Language: eng
Subjects: Telecommunication, Data encryption (Computer science), Cryptography
Publishers: Berlin ; Hong Kong : Springer-Verlag
Collections: folkscanomy miscellaneous, folkscanomy, additional collections
ISBN Number: 3540222170
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 275.57 MB
PDF Size: 4.98 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 536
Views: 586
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 b98360 archive torrent
Last Modified: 2022-03-09 09:19:55
Download
Size: 14.73 KB
Description
Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Author: Markus Jakobsson, Moti Yung, Jianying Zhou
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22217-0
DOI: 10.1007/b98360
Table of Contents:
Text (HTML/PDF), image (GIF/PDF) and search engine
Mode of access: Intranet
Caption title ; description based on screen of 2005-04-26
Includes bibliographical references and index
Author: Markus Jakobsson, Moti Yung, Jianying Zhou
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22217-0
DOI: 10.1007/b98360
Table of Contents:
- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
- Private Keyword-Based Push and Pull with Applications to Anonymous Communication
- Secure Conjunctive Keyword Search over Encrypted Data
- Evaluating Security of Voting Schemes in the Universal Composability Framework
- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security
- On the Security of Cryptosystems with All-or-Nothing Transform
- Centralized Management of Virtual Security Zones in IP Networks
- S-RIP: A Secure Distance Vector Routing Protocol
- A Pay-per-Use DoS Protection Mechanism for the Web
- Limited Verifier Signature from Bilinear Pairings
- Deniable Ring Authentication Revisited
- A Fully-Functional Group Signature Scheme over Only Known-Order Group
- Some Observations on Zap and Its Applications
- Security Measurements of Steganographic Systems
- X2Rep: Enhanced Trust Semantics for the XRep Protocol
- One-Round Protocols for Two-Party Authenticated Key Exchange
- Password Authenticated Key Exchange Using Quadratic Residues
- Key Agreement Using Statically Keyed Authenticators
- Low-Latency Cryptographic Protection for SCADA Communications
- A Best Practice for Root CA Key Update in PKI
Text (HTML/PDF), image (GIF/PDF) and search engine
Mode of access: Intranet
Caption title ; description based on screen of 2005-04-26
Includes bibliographical references and index
You May Also Like
We will be happy to hear your thoughts