CANS B

28 papers

YearTitle / Authors
2005A New Model for Dynamic Intrusion Detection.
Tao Li, Xiaojie Liu, Hongbin Li
2005A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.
Wei Lu, Issa Traoré
2005A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.
Fanyu Kong, Daxing Li
2005A Novel Method to Maintain Privacy in Mobile Agent Applications.
Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López
2005An Immune-Based Model for Computer Virus Detection.
Tao Li, Xiaojie Liu, Hongbin Li
2005Constructing Secure Warrant-Based Proxy Signcryption Schemes.
Yuan Zhou, Zhenfu Cao, Rongxing Lu
2005Constructions of Almost Resilient Functions.
Pinhui Ke, Tailin Liu, Qiao-Yan Wen
2005Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.
Wen Tao Zhu
2005Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li
2005Design and Implementation of an Inline Certified E-mail Service.
Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
2005Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.
Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao
2005Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.
Zhenfeng Zhang, Jing Xu, Dengguo Feng
2005Efficient Identity-Based Signatures and Blind Signatures.
Zhenjie Huang, Kefei Chen, Yumin Wang
2005How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.
Chong-zhi Gao, Zheng-an Yao
2005ID-Based Aggregate Signatures from Bilinear Pairings.
Jing Xu, Zhenfeng Zhang, Dengguo Feng
2005New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.
Eun-Jun Yoon, Kee-Young Yoo
2005Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.
Lasse Øverlier, Tønnes Brekne, André Årnes
2005On Securing RTP-Based Streaming Content with Firewalls.
Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
2005On the Performance and Analysis of DNS Security Extensions.
Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese
2005On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
2005On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.
Haiyong Bao, Zhenfu Cao, Haifeng Qian
2005Revaluation of Error Correcting Coding in Watermarking Channel.
Limin Gu, Yanmei Fang, Jiwu Huang
2005Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.
Yang Xiang, Wanlei Zhou
2005Security Analysis of Password-Authenticated Key Agreement Protocols.
Kyung-Ah Shim, Seung-Hyun Seo
2005Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection.
Ruo Ando, Yoshiyasu Takefuji
2005Similar Keys of Multivariate Quadratic Public Key Cryptosystems.
Yuh-Hua Hu, Lih-Chung Wang, Chun-Yen Chou, Feipei Lai
2005The Second-Preimage Attack on MD4.
Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
2005Two Proxy Signcryption Schemes from Bilinear Pairings.
Qin Wang, Zhenfu Cao