Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings

Bibliographic Details
Other Authors: Pointcheval, David (Editor), Mu, Yi (Editor), Chen, Kefei (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2006, 2006
Edition:1st ed. 2006
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03501nmm a2200433 u 4500
001 EB000377364
003 EBX01000000000000000230416
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783540494638 
100 1 |a Pointcheval, David  |e [editor] 
245 0 0 |a Cryptology and Network Security  |h Elektronische Ressource  |b 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings  |c edited by David Pointcheval, Yi Mu, Kefei Chen 
250 |a 1st ed. 2006 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2006, 2006 
300 |a XIII, 384 p  |b online resource 
505 0 |a Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks -- Implementation -- Bitslice Implementation of AES -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3) -- Steganalysis and Watermarking -- Steganalysis Based on Differential Statistics -- Watermarking Essential Data Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear Functions -- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing -- Intrusion Detection -- Cooperative Intrusion Detection for Web Applications -- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis -- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems -- A Multi-agent Cooperative Model and System for Integrated Security Monitoring -- Disponibility and Reliability.-Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network --  
505 0 |a An Immune-Based Model for Service Survivability -- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks 
505 0 |a Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems -- Efficient Identity-Based Encryption with Tight Security Reduction -- Key Exchange -- A Diffie-Hellman Key Exchange Protocol Without Random Oracles -- Authenticated Group Key Agreement for Multicast -- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks -- Authentication and Signatures -- Efficient Mutual Data Authentication Using Manually Authenticated Strings -- Achieving Multicast Stream Authentication Using MDS Codes -- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps -- Proxy Signatures -- Security Model of Proxy-Multi Signature Schemes -- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque -- Cryptanalysis -- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields -- Improved Collision Attack on Reduced Round Camellia --  
653 |a Computer Communication Networks 
653 |a Computers and Society 
653 |a Cryptography 
653 |a Algorithms 
653 |a Electronic data processing / Management 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a IT Operations 
653 |a Computers and civilization 
700 1 |a Mu, Yi  |e [editor] 
700 1 |a Chen, Kefei  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/11935070 
856 4 0 |u https://doi.org/10.1007/11935070?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824