


default search action
1st ACNS 2003: Kunming, China
- Jianying Zhou, Moti Yung, Yongfei Han:

Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings. Lecture Notes in Computer Science 2846, Springer 2003, ISBN 3-540-20208-0
Cryptographic Applications
- Ventzislav Nikov, Svetla Nikova, Bart Preneel:

Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case. 1-15 - Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji

:
Optimized Chi2-Attack against RC6. 16-32 - Yuko Tamura, Atsuko Miyaji

:
Anonymity-Enhanced Pseudonym System. 33-47
Intrusion Detection
- Kwong H. Yung:

Using Feedback to Improve Masquerade Detection. 48-62 - Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun:

Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. 63-75 - Fan Min

, Jun-yan Zhang, Guo-wie Yang:
An IP Traceback Scheme Integrating DPM and PPM. 76-85
Cryptographic Algorithms
- Sung-Ryul Kim:

Improved Scalable Hash Chain Traversal. 86-95 - Rui Zhang, Hideki Imai:

Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. 96-110 - Guilin Wang, Xiaoxi Han, Bo Zhu:

On the Security of Two Threshold Signature Schemes with Traceable Signers. 111-122
Digital Signature
- Mohamed Al-Ibrahim

, Anton Cerný:
Proxy and Threshold One-Time Signatures. 123-136 - Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng:

A Threshold GQ Signature Scheme. 137-150 - Gene Itkis, Peng Xie:

Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. 151-168 - Chong-zhi Gao, Zheng-an Yao, Lei Li:

A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. 169-175
Security Modelling
- Ching Lin, Vijay Varadharajan:

Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. 176-190 - Chun Ruan, Vijay Varadharajan:

An Authorization Model for E-consent Requirement in a Health Care Application. 191-205 - Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang:

PLI: A New Framework to Protect Digital Content for P2P Networks. 206-216
Web Security
- Chunyan Bai, Gui Liang Feng:

Improved Algebraic Traitor Tracing Scheme. 217-227 - Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang:

Common Vulnerability Markup Language. 228-240 - Tieyan Li, Yongdong Wu:

Trust on Web Browser: Attack vs. Defense. 241-253
Security Protocols
- Luciano Rila, Chris J. Mitchell

:
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. 254-264 - Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park:

Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. 265-279 - Jose L. Muñoz, Jordi Forné

, Oscar Esparza
, Miguel Soriano:
Using OCSP to Secure Certificate-Using Transactions in M-commerce. 280-292
Cryptanalysis
- Pierre Dusart, Gilles Letourneux, Olivier Vivolo:

Differential Fault Analysis on A.E.S. 293-306 - Roman Novak

:
Side-Channel Attack on Substitution Blocks. 307-318 - Yasuyuki Sakai, Kouichi Sakurai:

Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. 319-330 - Sarbani Palit, Bimal K. Roy, Arindom De:

A Fast Correlation Attack for LFSR-Based Stream Ciphers. 331-342
Key Management
- Gang Yao, Kui Ren, Feng Bao, Robert H. Deng

, Dengguo Feng:
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. 343-356 - Sangwon Lee, Yongdae Kim

, Kwangjo Kim, DaeHyun Ryu:
An Efficient Tree-Based Group Key Agreement Using Bilinear Map. 357-371 - Taenam Cho, Sang-Ho Lee:

A Key Recovery Mechanism for Reliable Group Key Management. 372-386
Efficient Implementations
- Sandeepan Chowdhury, Subhamoy Maitra:

Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model. 387-402 - Dong Jin Kwak, Sang-Jae Moon:

Efficient Distributed Signcryption Scheme as Group Signcryption. 403-417 - Johann Großschädl, Guy-Armand Kamendje:

Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors. 418-434

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














