LEADER 06852nam 22008415 450 001 996465681303316 005 20200630052301.0 010 $a1-280-39072-7 010 $a9786613568649 010 $a3-642-17619-4 024 7 $a10.1007/978-3-642-17619-7 035 $a(CKB)2670000000056702 035 $a(SSID)ssj0000476028 035 $a(PQKBManifestationID)11298164 035 $a(PQKBTitleCode)TC0000476028 035 $a(PQKBWorkID)10479232 035 $a(PQKB)10547887 035 $a(DE-He213)978-3-642-17619-7 035 $a(MiAaPQ)EBC3066210 035 $a(PPN)149890672 035 $a(EXLCZ)992670000000056702 100 $a20101130d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security$b[electronic resource] $e9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings /$fedited by Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIII, 355 p. 66 illus.) 225 1 $aSecurity and Cryptology ;$v6467 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-17618-6 320 $aIncludes bibliographical references and index. 327 $aBlock Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds -- An Algorithm Based Concurrent Error Detection Scheme for AES -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions -- Integral Distinguishers of Some SHA-3 Candidates -- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems -- Generating Parameters for Algebraic Torus-Based Cryptosystems -- Analysis of the MQQ Public Key Cryptosystem -- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations -- Invited Talk II -- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk) -- Secure Mechanisms -- Towards a Cryptographic Treatment of Publish/Subscribe Systems -- STE3D-CAP: Stereoscopic 3D CAPTCHA -- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic Group Key Exchange Revisited -- Towards Practical and Secure Coercion-Resistant Electronic Elections -- Anonymous Credentials -- Predicate Encryption with Partial Public Keys -- Anonymous Credential Schemes with Encrypted Attributes -- One Time Anonymous Certificate: X.509 Supporting Anonymity. 330 $aThe 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12?14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program Committee members were reviewed by at least ?ve reviewers. P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible for the contents of the review and r- resenting papers during the discussion and decision making. The review phase was followed by a 10-day discussion phase in which each paper with at least one supporting review was discussed, additional experts were consulted where needed, and ?nal decisions were made. We thank the Program Committee for their hard work in selecting the p- gram. We also thank the external reviewers who assisted with reviewing and the CANS Steering Committee for their help. We thank Shai Halevi for use of his Web-Submission-and-Review software that was used for the electronic s- mission and review of the submitted papers, and we thank the International Association for Cryptologic Research (IACR) for Web hosting of the software. 410 0$aSecurity and Cryptology ;$v6467 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer programming 606 $aComputer science?Mathematics 606 $aCoding theory 606 $aInformation theory 606 $aData structures (Computer science) 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer programming. 615 0$aComputer science?Mathematics. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData structures (Computer science). 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aProgramming Techniques. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aCoding and Information Theory. 615 24$aData Structures and Information Theory. 676 $a005.8 702 $aHeng$b Swee-Huay$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWright$b Rebecca N$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGoi$b Bok-Min$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Cryptology and Network Security 906 $aBOOK 912 $a996465681303316 996 $aCryptology and Network Security$9772198 997 $aUNISA