CANS B

27 papers

YearTitle / Authors
2006A Diffie-Hellman Key Exchange Protocol Without Random Oracles.
Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee
2006A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over
Jianqin Zhou, Qiang Zheng
2006A Multi-agent Cooperative Model and System for Integrated Security Monitoring.
Xianxian Li, Lijun Liu
2006A Note of Perfect Nonlinear Functions.
Xiyong Zhang, Hua Guo, Jinjiang Yuan
2006Achieving Multicast Stream Authentication Using MDS Codes.
Christophe Tartary, Huaxiong Wang
2006An Immune-Based Model for Service Survivability.
Jinquan Zeng, Xiaojie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu
2006Authenticated Group Key Agreement for Multicast.
Liming Wang, Chuan-Kun Wu
2006Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.
Hongsong Shi, Mingxing He, Zhiguang Qin
2006Bitslice Implementation of AES.
Chester Rebeiro, A. David Selvakumar, A. S. L. Devi
2006Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing.
Xiaomin Wang, Jiashu Zhang, Wenfang Zhang
2006Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.
Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
2006Cooperative Intrusion Detection for Web Applications.
Nathalie Dagorn
2006Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings
David Pointcheval, Yi Mu, Kefei Chen
2006Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network.
Jian Kang, Yuan Zhang, Jiu-bin Ju
2006Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.
Rongxing Lu, Zhenfu Cao, Xiaolei Dong
2006Efficient Identity-Based Encryption with Tight Security Reduction.
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
2006Efficient Mutual Data Authentication Using Manually Authenticated Strings.
Sven Laur, Kaisa Nyberg
2006Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.
Jianhua Yang, Byong Lee, Yongzhong Zhang
2006Improved Collision Attack on Reduced Round Camellia.
Guan Jie, Zhongya Zhang
2006Security Model of Proxy-Multi Signature Schemes.
Feng Cao, Zhenfu Cao
2006Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps.
Sujing Zhou, Dongdai Lin
2006Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
2006Smart Architecture for High-Speed Intrusion Detection and Prevention Systems.
Chih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang
2006Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks.
Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski
2006Steganalysis Based on Differential Statistics.
Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan
2006Watermarking Essential Data Structures for Copyright Protection.
Qutaiba Albluwi, Ibrahim Kamel
2006X
Lan Yu, Willy Susilo, Reihaneh Safavi-Naini