


default search action
4th ACNS 2006: Singapore
- Jianying Zhou, Moti Yung, Feng Bao:

Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings. Lecture Notes in Computer Science 3989, 2006, ISBN 3-540-34703-8
Intrusion Avoidance and Detection
- Ahren Studer, Chenxi Wang:

Adaptive Detection of Local Scanners. 1-17 - Jianhua Yang, Yongzhong Zhang:

Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. 18-32 - Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough:

DSO: Dependable Signing Overlay. 33-49
Cryptographic Applications
- Ahto Buldas

, Sven Laur:
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? 50-65 - Sébastien Canard, Aline Gouget, Emeline Hufschmitt:

A Handy Multi-coupon System. 66-81 - Dongvu Tonien

, Reihaneh Safavi-Naini:
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. 82-97
DoS: Attacks and Countermeasures
- Sujata Doshi, Fabian Monrose, Aviel D. Rubin:

Efficient Memory Bound Puzzles Using Pattern Databases. 98-113 - Mun Choon Chan, Ee-Chien Chang

, Liming Lu, Peng Song Ngiam:
Effect of Malicious Synchronization. 114-129 - Elias Athanasopoulos, Kostas G. Anagnostakis

, Evangelos P. Markatos:
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. 130-145
Key Management
- Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd:

Password Based Server Aided Key Exchange . 146-161 - Qiang Tang, Kim-Kwang Raymond Choo:

Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. 162-177 - Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm:

Stateful Subset Cover. 178-193
Cryptanalysis
- Khoongming Khoo, Guang Gong, Hian-Kiat Lee:

The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. 194-209 - Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding

:
Breaking a New Instance of TTM Cryptosystems. 210-225 - Raphael C.-W. Phan

, Bok-Min Goi
:
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. 226-238
Security of Limited Devices
- Christoph Herbst, Elisabeth Oswald

, Stefan Mangard
:
An AES Smart Card Implementation Resistant to Power Analysis Attacks. 239-252 - Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi:

Physical Security Bounds Against Tampering. 253-267 - Camille Vuillaume, Katsuyuki Okeya:

Flexible Exponentiation with Resistance to Side Channel Attacks. 268-283
Cryptography
- Dayin Wang, Dongdai Lin, Wenling Wu:

An Improved Poly1305 MAC. 284-292 - Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng:

Certificateless Public-Key Signature: Security Model and Efficient Construction. 293-308 - Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi

:
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. 309-324
Authentication and Web Security
- Stanislaw Jarecki, Jihye Kim

, Gene Tsudik:
Authentication for Paranoids: Multi-party Secret Handshakes. 325-339 - Xinghua Li, Sang-Jae Moon, Jianfeng Ma:

On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. 340-348 - Angelos Stavrou

, Michael E. Locasto, Angelos D. Keromytis:
W3Bcrypt: Encryption as a Stylesheet. 349-364
Ad Hoc and Sensor Network Security
- Dibyendu Chakrabarti, Jennifer Seberry:

Combinatorial Structures for Design of Wireless Sensor Networks. 365-374 - Nitesh Saxena:

Public Key Cryptography Sans Certificates in Ad Hoc Networks. 375-389 - JongHyup Lee, Taekyoung Kwon, JooSeok Song:

Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. 390-404
Cryptographic Constructions
- Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal:

A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. 405-420 - Pinhui Ke, Jie Zhang, Qiaoyan Wen:

Results on Almost Resilient Functions. 421-432 - Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen:

Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. 433-447
Security and Privacy
- Mohamed A. Haleem

, Chetan Nanjunda Mathur, Rajarathnam Chandramouli
, K. P. Subbalakshmi
:
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. 448-458 - Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka:

Improving the Randomized Initial Point Countermeasure Against DPA. 459-469 - Aggelos Kiayias, Antonina Mitrofanova:

Syntax-Driven Private Evaluation of Quantified Membership Queries. 470-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














