000 04486nam a22005895i 4500
001 978-3-642-17619-7
003 DE-He213
005 20140220084551.0
007 cr nn 008mamaa
008 101130s2010 gw | s |||| 0|eng d
020 _a9783642176197
_9978-3-642-17619-7
024 7 _a10.1007/978-3-642-17619-7
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aHeng, Swee-Huay.
_eeditor.
245 1 0 _aCryptology and Network Security
_h[electronic resource] :
_b9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings /
_cedited by Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXIII, 355p. 66 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6467
505 0 _aBlock Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds -- An Algorithm Based Concurrent Error Detection Scheme for AES -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions -- Integral Distinguishers of Some SHA-3 Candidates -- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems -- Generating Parameters for Algebraic Torus-Based Cryptosystems -- Analysis of the MQQ Public Key Cryptosystem -- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations -- Invited Talk II -- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk) -- Secure Mechanisms -- Towards a Cryptographic Treatment of Publish/Subscribe Systems -- STE3D-CAP: Stereoscopic 3D CAPTCHA -- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic Group Key Exchange Revisited -- Towards Practical and Secure Coercion-Resistant Electronic Elections -- Anonymous Credentials -- Predicate Encryption with Partial Public Keys -- Anonymous Credential Schemes with Encrypted Attributes -- One Time Anonymous Certificate: X.509 Supporting Anonymity.
520 _aThis book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Network Security, CANS 2010, held in Kuala Lumpur, Malaysia, in December 2010. The 21 revised full papers, presented together with abstracts of 2 invited talks, were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on block ciphers, wireless network security, hash functions, public key cryptography, secure mechanisms, cryptographic protocols, and anonymous credentials.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 0 _aComputational complexity.
650 0 _aAlgebra
_xData processing.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aComputer Communication Networks.
650 2 4 _aDiscrete Mathematics in Computer Science.
650 2 4 _aCoding and Information Theory.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aSymbolic and Algebraic Manipulation.
700 1 _aWright, Rebecca N.
_eeditor.
700 1 _aGoi, Bok-Min.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642176180
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6467
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-17619-7
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112939
_d112939