Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings

Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings

Hot Research Book in Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings

Author(s) Name:  Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (Eds.)

About the Book:

   This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009. The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash functions, lattices, and side-channel attacks.

Table of Contents

  • Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
  • Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
  • Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior
  • How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
  • Novel Precomputation Schemes for Elliptic Curve Cryptosystems
  • Practical Secure Evaluation of Semi-private Functions
  • Secure Hamming Distance Based Computation and Its Applications
  • Efficient Robust Private Set Intersection
  • A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
  • An Efficient Identity-Based Online/Offline Encryption Scheme
  • Dual-Policy Attribute Based Encryption
  • Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
  • ISBN:   9783642019562

    Publisher:   Springer-Verlag Berlin Heidelberg

    Year of Publication:   2009

    Book Link:  Home Page Url