Lecture Notes in Computer Science

Applied Cryptography and Network Security

Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings

Editors: Jakobsson, Markus, Young, Moti, Zhou, Jianying (Eds.)

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-540-24852-1
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA
  • ISBN 978-3-540-22217-0
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8–11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag. The area of research that ACNS covers has been gaining importance in recent years due to the development of the Internet, which, in turn, implies global exposure of computing resources. Many ?elds of research were covered by the program of this track, presented in this proceedings volume. We feel that the papers herein indeed re?ect the state of the art in security and cryptography research, worldwide. The program committee of the conference received a total of 297 submissions from all over the world, of which 36 submissions were selected for presentation during the academic track. In addition to this track, the conference also hosted a technical/industrial track of presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas.

Table of contents (36 chapters)

  • CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap

    Locasto, Michael E. (et al.)

    Pages 1-15

  • Private Keyword-Based Push and Pull with Applications to Anonymous Communication

    Kissner, Lea (et al.)

    Pages 16-30

  • Secure Conjunctive Keyword Search over Encrypted Data

    Golle, Philippe (et al.)

    Pages 31-45

  • Evaluating Security of Voting Schemes in the Universal Composability Framework

    Groth, Jens

    Pages 46-60

  • Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security

    Nguyen, Lan (et al.)

    Pages 61-75

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-540-24852-1
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA
  • ISBN 978-3-540-22217-0
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Applied Cryptography and Network Security
Book Subtitle
Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Editors
  • Markus Jakobsson
  • Moti Young
  • Jianying Zhou
Series Title
Lecture Notes in Computer Science
Series Volume
3089
Copyright
2004
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-24852-1
DOI
10.1007/b98360
Softcover ISBN
978-3-540-22217-0
Series ISSN
0302-9743
Edition Number
1
Number of Pages
XIII, 511
Topics