175 years of Springer publishing +++ Through June 30: 50% off Physics & Astronomy Books

Security and Cryptology

Applied Cryptography and Network Security

8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings

Editors: Zhou, Jianying, Young, Moti (Eds.)

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-642-13708-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA
  • ISBN 978-3-642-13707-5
  • Free shipping for individuals worldwide
  • Online orders shipping within 2-3 days.
About this book

ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris,France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track.

Table of contents (32 chapters)

  • On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption

    Bauer, Aurélie (et al.)

    Pages 1-18

  • How to Construct Interval Encryption from Binary Tree Encryption

    Lin, Huang (et al.)

    Pages 19-34

  • Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions

    Boyen, Xavier (et al.)

    Pages 35-52

  • Trapdoor Sanitizable Signatures Made Easy

    Yum, Dae Hyun (et al.)

    Pages 53-68

  • Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs

    Rückert, Markus (et al.)

    Pages 69-86

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-642-13708-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA
  • ISBN 978-3-642-13707-5
  • Free shipping for individuals worldwide
  • Online orders shipping within 2-3 days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Applied Cryptography and Network Security
Book Subtitle
8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings
Editors
  • Jianying Zhou
  • Moti Young
Series Title
Security and Cryptology
Series Volume
6123
Copyright
2010
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-642-13708-2
DOI
10.1007/978-3-642-13708-2
Softcover ISBN
978-3-642-13707-5
Edition Number
1
Number of Pages
XIII, 564
Number of Illustrations and Tables
83 b/w illustrations
Topics