05628nam 22008175 450 99646537840331620200702030646.010.1007/11599371(CKB)1000000000213557(SSID)ssj0000317077(PQKBManifestationID)11258594(PQKBTitleCode)TC0000317077(PQKBWorkID)10286929(PQKB)10102360(DE-He213)978-3-540-32298-6(MiAaPQ)EBC3067865(PPN)123098947(EXLCZ)99100000000021355720100411d2005 u| 0engurnn|008mamaatxtccrCryptology and Network Security[electronic resource] 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings /edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (XII, 352 p.) Security and Cryptology ;3810Bibliographic Level Mode of Issuance: Monograph3-540-32298-1 3-540-30849-0 Includes bibliographical references and index.Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -- An Immune-Based Model for Computer Virus Detection -- A New Model for Dynamic Intrusion Detection -- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection -- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time -- Authentication and Signature -- ID-Based Aggregate Signatures from Bilinear Pairings -- Efficient Identity-Based Signatures and Blind Signatures -- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures -- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange -- Signcryption -- Two Proxy Signcryption Schemes from Bilinear Pairings -- Constructing Secure Warrant-Based Proxy Signcryption Schemes -- E-mail Security -- Design and Implementation of an Inline Certified E-mail Service -- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery -- Cryptosystems -- Similar Keys of Multivariate Quadratic Public Key Cryptosystems -- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems -- Constructions of Almost Resilient Functions -- Privacy and Tracing -- A Novel Method to Maintain Privacy in Mobile Agent Applications -- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring -- Information Hiding -- Revaluation of Error Correcting Coding in Watermarking Channel -- Firewalls, Denial of Service and DNS Security -- On the Performance and Analysis of DNS Security Extensions -- On Securing RTP-Based Streaming Content with Firewalls -- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling -- Trust Management -- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.Security and Cryptology ;3810Computer communication systemsData encryption (Computer science)Operating systems (Computers)Management information systemsComputer scienceComputers and civilizationAlgorithmsComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computer communication systems.Data encryption (Computer science).Operating systems (Computers).Management information systems.Computer science.Computers and civilization.Algorithms.Computer Communication Networks.Cryptology.Operating Systems.Management of Computing and Information Systems.Computers and Society.Algorithm Analysis and Problem Complexity.005.8Desmedt Yvo Gedthttp://id.loc.gov/vocabulary/relators/edtWang Huaxiongedthttp://id.loc.gov/vocabulary/relators/edtMu Yiedthttp://id.loc.gov/vocabulary/relators/edtLi Yongqingedthttp://id.loc.gov/vocabulary/relators/edtInternational Conference on Cryptology and Network SecurityBOOK996465378403316Cryptology and Network Security772198UNISA