↓ Skip to main content

Applied Cryptography and Network Security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings

Overview of attention for book
Cover of 'Applied Cryptography and Network Security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
  3. Altmetric Badge
    Chapter 2 Private Keyword-Based Push and Pull with Applications to Anonymous Communication
  4. Altmetric Badge
    Chapter 3 Secure Conjunctive Keyword Search over Encrypted Data
  5. Altmetric Badge
    Chapter 4 Evaluating Security of Voting Schemes in the Universal Composability Framework
  6. Altmetric Badge
    Chapter 5 Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security
  7. Altmetric Badge
    Chapter 6 On the Security of Cryptosystems with All-or-Nothing Transform
  8. Altmetric Badge
    Chapter 7 Centralized Management of Virtual Security Zones in IP Networks
  9. Altmetric Badge
    Chapter 8 S-RIP: A Secure Distance Vector Routing Protocol
  10. Altmetric Badge
    Chapter 9 A Pay-per-Use DoS Protection Mechanism for the Web
  11. Altmetric Badge
    Chapter 10 Limited Verifier Signature from Bilinear Pairings
  12. Altmetric Badge
    Chapter 11 Deniable Ring Authentication Revisited
  13. Altmetric Badge
    Chapter 12 A Fully-Functional Group Signature Scheme over Only Known-Order Group
  14. Altmetric Badge
    Chapter 13 Some Observations on Zap and Its Applications
  15. Altmetric Badge
    Chapter 14 Security Measurements of Steganographic Systems
  16. Altmetric Badge
    Chapter 15 X 2 Rep: Enhanced Trust Semantics for the XRep Protocol
  17. Altmetric Badge
    Chapter 16 One-Round Protocols for Two-Party Authenticated Key Exchange
  18. Altmetric Badge
    Chapter 17 Password Authenticated Key Exchange Using Quadratic Residues
  19. Altmetric Badge
    Chapter 18 Key Agreement Using Statically Keyed Authenticators
  20. Altmetric Badge
    Chapter 19 Low-Latency Cryptographic Protection for SCADA Communications
  21. Altmetric Badge
    Chapter 20 A Best Practice for Root CA Key Update in PKI
  22. Altmetric Badge
    Chapter 21 SQLrand: Preventing SQL Injection Attacks
  23. Altmetric Badge
    Chapter 22 Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem
  24. Altmetric Badge
    Chapter 23 Success Probability in χ 2 -Attacks
  25. Altmetric Badge
    Chapter 24 More Generalized Clock-Controlled Alternating Step Generator
  26. Altmetric Badge
    Chapter 25 FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy
  27. Altmetric Badge
    Chapter 26 Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model
  28. Altmetric Badge
    Chapter 27 Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity
  29. Altmetric Badge
    Chapter 28 Security Analysis of CRT-Based Cryptosystems
  30. Altmetric Badge
    Chapter 29 Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits
  31. Altmetric Badge
    Chapter 30 Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords
  32. Altmetric Badge
    Chapter 31 Advanced Packet Marking Mechanism with Pushback for IP Traceback
  33. Altmetric Badge
    Chapter 32 A Parallel Intrusion Detection System for High-Speed Networks
  34. Altmetric Badge
    Chapter 33 A Novel Framework for Alert Correlation and Understanding
  35. Altmetric Badge
    Chapter 34 An Improved Algorithm for uP + vQ Using JSF $_{3}^{1}$
  36. Altmetric Badge
    Chapter 35 New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF ( p n )
  37. Altmetric Badge
    Chapter 36 Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

1 patent
1 Wikipedia page


9 Dimensions

Readers on

26 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Applied Cryptography and Network Security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Published by
Springer Berlin Heidelberg, May 2004
DOI 10.1007/b98360
978-3-54-022217-0, 978-3-54-024852-1

Jakobsson, Markus, Zhou, Jianying, Yung, Moti

Mendeley readers

The data shown below were compiled from readership statistics for 26 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 26 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 8%
Student > Bachelor 1 4%
Student > Master 1 4%
Professor > Associate Professor 1 4%
Unknown 21 81%
Readers by discipline Count As %
Computer Science 5 19%
Unknown 21 81%