ACNS B

36 papers

YearTitle / Authors
2005A Traitor Tracing Scheme Based on RSA for Fast Decryption.
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
2005An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption.
Hsiao-Ying Lin, Wen-Guey Tzeng
2005Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings
John Ioannidis, Angelos D. Keromytis, Moti Yung
2005Badger - A Fast and Provably Secure MAC.
Martin Boesgaard, Thomas Christensen, Erik Zenner
2005Building Reliable Mix Networks with Fair Exchange.
Michael K. Reiter, Xiaofeng Wang, Matthew K. Wright
2005Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme.
Raphael Chung-Wei Phan, Bok-Min Goi
2005Digital Signatures Do Not Guarantee Exclusive Ownership.
Thomas Pornin, Julien P. Stern
2005Dynamic k-Times Anonymous Authentication.
Lan Nguyen, Reihaneh Safavi-Naini
2005Efficient Anonymous Roaming and Its Security Analysis.
Guomin Yang, Duncan S. Wong, Xiaotie Deng
2005Efficient Constructions for One-Way Hash Chains.
Yih-Chun Hu, Markus Jakobsson, Adrian Perrig
2005Efficient Identity Based Ring Signature.
Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui
2005Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.
Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
2005Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.
SeongHan Shin, Kazukuni Kobara, Hideki Imai
2005IDS False Alarm Reduction Using Continuous and Discontinuous Patterns.
Abdulrahman Alharby, Hideki Imai
2005Identity Based Encryption Without Redundancy.
Benoît Libert, Jean-Jacques Quisquater
2005Indexing Information for Data Forensics.
Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia
2005Intrusion-Resilient Secure Channels.
Gene Itkis, Robert McNerney, Scott Russell
2005Messin' with Texas Deriving Mother's Maiden Names Using Public Records.
Virgil Griffith, Markus Jakobsson
2005Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.
Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji
2005Model Generalization and Its Implications on Intrusion Detection.
Zhuowei Li, Amitabha Das, Jianying Zhou
2005N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.
Jin Wook Byun, Dong Hoon Lee
2005New Signature Schemes with Coupons and Tight Reduction.
Benoît Chevallier-Mames
2005Non-interactive Zero-Knowledge Arguments for Voting.
Jens Groth
2005OACerts: Oblivious Attribute Certificates.
Jiangtao Li, Ninghui Li
2005Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications.
Flavio D. Garcia, Jaap-Henk Hoepman
2005Optimal Asymmetric Encryption and Signature Paddings.
Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval
2005Privacy Preserving Keyword Searches on Remote Encrypted Data.
Yan-Cheng Chang, Michael Mitzenmacher
2005Quantifying Security in Hybrid Cellular Networks.
Markus Jakobsson, Liu Yang
2005Rainbow, a New Multivariable Polynomial Signature Scheme.
Jintai Ding, Dieter Schmidt
2005Robust Key Extraction from Physical Uncloneable Functions.
Boris Skoric, Pim Tuyls, W. Ophey
2005SCARE of the DES.
Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette
2005Searching for High-Value Rare Events with Uncheatable Grid Computing.
Wenliang Du, Michael T. Goodrich
2005Short Signature and Universal Designated Verifier Signature Without Random Oracles.
Rui Zhang, Jun Furukawa, Hideki Imai
2005Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
2005Thompson's Group and Public Key Cryptography.
Vladimir Shpilrain, Alexander Ushakov
2005Two-Server Password-Only Authenticated Key Exchange.
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor