[PDF] Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings - eBookmela

Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings

New Added
Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
Likes+254
Telegram icon Share on Telegram

Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004,

User Rating: Be the first one!

Author: ACNS 2004 (2nd : 2004 : Yellow Mountain, China), Jakobsson, Markus, Yung, Moti, Zhou, Jianying, SpringerLink (Online service)

Added by: sketch

Added Date: 2015-12-29

Language: eng

Subjects: Telecommunication, Data encryption (Computer science), Cryptography

Publishers: Berlin ; Hong Kong : Springer-Verlag

Collections: folkscanomy miscellaneous, folkscanomy, additional collections

ISBN Number: 3540222170

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 275.57 MB

PDF Size: 4.98 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Archive Url

Downloads: 536

Views: 586

Total Files: 18

Media Type: texts

PDF With Zip
Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings

April 13, 2022

Download PDF

4.98 MB 1PDF Files

Zip Big Size
Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings

April 13, 2022

Download Zip

275.57 MB 18Files

Total Files: 5

PDF
Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
10 1007 b98360 pdf

Last Modified: 2015-12-29 14:08:43

Download

Size: 4.98 MB

GZ
Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
10 1007 b98360 abbyy gz

Last Modified: 2015-12-29 15:23:03

Download

Size: 18.38 MB

TXT
Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
10 1007 b98360 djvu txt

Last Modified: 2016-01-09 17:41:03

Download

Size: 592.45 KB

ZIP
Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
10 1007 b98360 jp2 zip

Last Modified: 2015-12-29 14:13:32

Download

Size: 231.37 MB

TORRENT
Applied cryptography and network security [electronic resource] : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
springer 10 1007 b98360 archive torrent

Last Modified: 2022-03-09 09:19:55

Download

Size: 14.73 KB

Description

Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Author: Markus Jakobsson, Moti Yung, Jianying Zhou
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22217-0
DOI: 10.1007/b98360

Table of Contents:

  • CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
  • Private Keyword-Based Push and Pull with Applications to Anonymous Communication
  • Secure Conjunctive Keyword Search over Encrypted Data
  • Evaluating Security of Voting Schemes in the Universal Composability Framework
  • Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security
  • On the Security of Cryptosystems with All-or-Nothing Transform
  • Centralized Management of Virtual Security Zones in IP Networks
  • S-RIP: A Secure Distance Vector Routing Protocol
  • A Pay-per-Use DoS Protection Mechanism for the Web
  • Limited Verifier Signature from Bilinear Pairings
  • Deniable Ring Authentication Revisited
  • A Fully-Functional Group Signature Scheme over Only Known-Order Group
  • Some Observations on Zap and Its Applications
  • Security Measurements of Steganographic Systems
  • X2Rep: Enhanced Trust Semantics for the XRep Protocol
  • One-Round Protocols for Two-Party Authenticated Key Exchange
  • Password Authenticated Key Exchange Using Quadratic Residues
  • Key Agreement Using Statically Keyed Authenticators
  • Low-Latency Cryptographic Protection for SCADA Communications
  • A Best Practice for Root CA Key Update in PKI

Text (HTML/PDF), image (GIF/PDF) and search engine
Mode of access: Intranet
Caption title ; description based on screen of 2005-04-26
Includes bibliographical references and index

You May Also Like

We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account