LEADER 05441nam 22008295 450 001 996465617203316 005 20230412073315.0 010 $a3-540-68914-1 024 7 $a10.1007/978-3-540-68914-0 035 $a(CKB)1000000000440611 035 $a(SSID)ssj0000316267 035 $a(PQKBManifestationID)11247247 035 $a(PQKBTitleCode)TC0000316267 035 $a(PQKBWorkID)10274872 035 $a(PQKB)10003395 035 $a(DE-He213)978-3-540-68914-0 035 $a(MiAaPQ)EBC3068506 035 $a(PPN)127048308 035 $a(EXLCZ)991000000000440611 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Cryptography and Network Security$b[electronic resource] $e6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings /$fedited by Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XI, 508 p.) 225 1 $aSecurity and Cryptology ;$v5037 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-68913-3 320 $aIncludes bibliographical references and index. 327 $aOn the Effectiveness of Internal Patching Against File-Sharing Worms -- Peeking Through the Cloud: DNS-Based Estimation and Its Applications -- Pushback for Overlay Networks: Protecting Against Malicious Insiders -- PPAA: Peer-to-Peer Anonymous Authentication -- Generic Constructions of Stateful Public Key Encryption and Their Applications -- Traceable and Retrievable Identity-Based Encryption -- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures -- Attacking Reduced Round SHA-256 -- Dakota ? Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography -- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? -- Replay Attack in a Fair Exchange Protocol -- Improved Conditional E-Payments -- Anonymity in Transferable E-cash -- Generic Security-Amplifying Methods of Ordinary Digital Signatures -- New Differential-Algebraic Attacks and Reparametrization of Rainbow -- Trapdoor Sanitizable Signatures and Their Application to Content Protection -- Multi-factor Authenticated Key Exchange -- Repelling Detour Attack Against Onions with Re-encryption -- Analysis of EAP-GPSK Authentication Protocol -- Efficient Device Pairing Using ?Human-Comparable? Synchronized Audiovisual Patterns -- PUF-HB: A Tamper-Resilient HB Based Authentication Protocol -- An Authentication Scheme Based on the Twisted Conjugacy Problem -- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance -- A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation -- On the Security of the CCM Encryption Mode and of a Slight Variant -- wNAF *, an Efficient Left-to-Right Signed Digit Recoding Algorithm -- A Very Compact ?Perfectly Masked? S-Box for AES -- Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks -- Traceable Privacy of Recent Provably-Secure RFID Protocols -- The Security of EPC Gen2 Compliant RFID Protocols. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives. 410 0$aSecurity and Cryptology ;$v5037 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aApplication software 606 $aComputers and civilization 606 $aElectronic data processing?Management 606 $aComputer Communication Networks 606 $aCryptology 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputers and Society 606 $aIT Operations 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aApplication software. 615 0$aComputers and civilization. 615 0$aElectronic data processing?Management. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputers and Society. 615 24$aIT Operations. 676 $a005.8 702 $aBellovin$b Steven M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGennaro$b Rosario$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKeromytis$b Angelos D$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aACNS 2008 906 $aBOOK 912 $a996465617203316 996 $aApplied Cryptography and Network Security$9771881 997 $aUNISA