ACNS B

37 papers

YearTitle / Authors
2004A Best Practice for Root CA Key Update in PKI.
Inkyoung Jeun, Jongwook Park, TaeKyu Choi, Sang Wan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin
2004A Fully-Functional Group Signature Scheme over Only Known-Order Group.
Atsuko Miyaji, Kozue Umeda
2004A Novel Framework for Alert Correlation and Understanding.
Dong Yu, Deborah A. Frincke
2004A Parallel Intrusion Detection System for High-Speed Networks.
Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li
2004A Pay-per-Use DoS Protection Mechanism for the Web.
Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
2004Advanced Packet Marking Mechanism with Pushback for IP Traceback.
Hyung-Woo Lee
2004An Improved Algorithm for uP + vQ Using JSF
BaiJie Kuang, Yuefei Zhu, Yajuan Zhang
2004Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings
Markus Jakobsson, Moti Yung, Jianying Zhou
2004Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
2004CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.
Michael E. Locasto, Angelos D. Keromytis
2004Centralized Management of Virtual Security Zones in IP Networks.
Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen
2004Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi
2004Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.
Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
2004Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits.
Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
2004Deniable Ring Authentication Revisited.
Willy Susilo, Yi Mu
2004Evaluating Security of Voting Schemes in the Universal Composability Framework.
Jens Groth
2004FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy.
Daisuke Inoue, Masahiro Kuroda
2004Key Agreement Using Statically Keyed Authenticators.
Colin Boyd, Wenbo Mao, Kenneth G. Paterson
2004Limited Verifier Signature from Bilinear Pairings.
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2004Low-Latency Cryptographic Protection for SCADA Communications.
Andrew K. Wright, John A. Kinast, Joe McCarty
2004More Generalized Clock-Controlled Alternating Step Generator.
Ali A. Kanso
2004New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p
Palash Sarkar, Pradeep Kumar Mishra, Rana Barua
2004On the Security of Cryptosystems with All-or-Nothing Transform.
Rui Zhang, Goichiro Hanaoka, Hideki Imai
2004One-Round Protocols for Two-Party Authenticated Key Exchange.
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
2004Password Authenticated Key Exchange Using Quadratic Residues.
Muxiang Zhang
2004Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang
2004S-RIP: A Secure Distance Vector Routing Protocol.
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
2004SQLrand: Preventing SQL Injection Attacks.
Stephen W. Boyd, Angelos D. Keromytis
2004Secure Conjunctive Keyword Search over Encrypted Data.
Philippe Golle, Jessica Staddon, Brent R. Waters
2004Security Analysis of CRT-Based Cryptosystems.
Katsuyuki Okeya, Tsuyoshi Takagi
2004Security Measurements of Steganographic Systems.
Weiming Zhang, Shiqu Li
2004Some Observations on Zap and Its Applications.
Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu
2004Success Probability in Chi
Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano
2004Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
2004Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.
Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa
2004Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords.
Shuhong Wang, Jie Wang, Maozhi Xu
2004X
Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo