LEADER 04113nam 2200661 450 001 996465828003316 005 20220427134423.0 010 $a3-540-76969-2 024 7 $a10.1007/978-3-540-76969-9 035 $a(CKB)1000000000490476 035 $a(SSID)ssj0000317075 035 $a(PQKBManifestationID)11246644 035 $a(PQKBTitleCode)TC0000317075 035 $a(PQKBWorkID)10287272 035 $a(PQKB)10893313 035 $a(DE-He213)978-3-540-76969-9 035 $a(MiAaPQ)EBC4975801 035 $a(MiAaPQ)EBC336929 035 $a(MiAaPQ)EBC6698741 035 $a(Au-PeEL)EBL336929 035 $a(OCoLC)191471550 035 $a(Au-PeEL)EBL6698741 035 $a(PPN)123729173 035 $a(EXLCZ)991000000000490476 100 $a20220427d2007 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aCryptology and network security $e6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings /$fFeng Bao [and three others] (editors) 205 $a1st ed. 2007. 210 1$aBerlin, Germany ;$aNew York, New York :$cSpringer,$d[2007] 210 4$dİ2007 215 $a1 online resource (XII, 286 p.) 225 1 $aSecurity and Cryptology ;$v4856 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-76968-4 320 $aIncludes bibliographical references and index. 327 $aSignatures -- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles -- A Generic Construction for Universally-Convertible Undeniable Signatures -- Fast Digital Signature Algorithm Based on Subgraph Isomorphism -- Efficient ID-Based Digital Signatures with Message Recovery -- Network Security -- Achieving Mobility and Anonymity in IP-Based Networks -- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary -- Forward-Secure Key Evolution in Wireless Sensor Networks -- A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations -- An Intelligent Network-Warning Model with Strong Survivability -- Running on Karma ? P2P Reputation and Currency Systems -- Secure Keyword Search and Private Information Retrieval -- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption -- Extended Private Information Retrieval and Its Application in Biometrics Authentications -- Public Key Encryption -- Strongly Secure Certificateless Public Key Encryption Without Pairing -- Intrusion Detection -- Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems -- Email Security -- How to Secure Your Email Address Book and Beyond -- Denial of Service Attacks -- Toward Non-parallelizable Client Puzzles -- Authentication -- Anonymity 2.0 ? X.509 Extensions Supporting Privacy-Friendly Authentication. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication. 410 0$aSecurity and Cryptology ;$v4856 606 $aComputer networks$xSecurity measures$vCongresses 606 $aCryptography$vCongresses 615 0$aComputer networks$xSecurity measures 615 0$aCryptography 676 $a005.8 686 $aDAT 461f$2stub 702 $aBao$b Feng$cDr, 712 02$aInternational Association for Cryptologic Research. 712 12$aInternational Conference on Cryptology and Network Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465828003316 996 $aCryptology and Network Security$9772198 997 $aUNISA