Skip to main content
  • Conference proceedings
  • © 2011

Applied Cryptography and Network Security

9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6715)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

  2. Session 1: Malware and Intrusion Detection

    1. Inferring Protocol State Machine from Network Traces: A Probabilistic Approach

      • Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo
      Pages 1-18
    2. A Specification Based Intrusion Detection Framework for Mobile Phones

      • Ashwin Chaugule, Zhi Xu, Sencun Zhu
      Pages 19-37
    3. Misuse Detection in Consent-Based Networks

      • Mansoor Alicherry, Angelos D. Keromytis
      Pages 38-56
  3. Session 2: Attacks I

    1. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

      • Martin Albrecht, Carlos Cid
      Pages 57-72
    2. Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF

      • Alex Biryukov, Ilya Kizhvatov, Bin Zhang
      Pages 91-109
    3. Cache Timing Analysis of RC4

      • Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux
      Pages 110-129
  4. Session 3: Applied Crypto I

    1. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications

      • Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
      Pages 130-146
    2. Private Discovery of Common Social Contacts

      • Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
      Pages 147-165
  5. Session 4: Signatures and Friends

    1. Double-Trapdoor Anonymous Tags for Traceable Signatures

      • Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 183-200
    2. Hierarchical Identity-Based Chameleon Hash and Its Applications

      • Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao
      Pages 201-219
  6. Session 5: Eclectic Assortment

    1. Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting

      • Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt, Kanta Matsuura
      Pages 220-237
    2. Quantitatively Analyzing Stealthy Communication Channels

      • Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
      Pages 238-254
    3. Fully Non-interactive Onion Routing with Forward-Secrecy

      • Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi
      Pages 255-273
  7. Session 6: Theory

    1. Generic Fully Simulatable Adaptive Oblivious Transfer

      • Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
      Pages 274-291
    2. Relaxed Security Notions for Signatures of Knowledge

      • Marc Fischlin, Cristina Onete
      Pages 309-326
  8. Session 7: Encryption

    1. LBlock: A Lightweight Block Cipher

      • Wenling Wu, Lei Zhang
      Pages 327-344

Other Volumes

  1. Applied Cryptography and Network Security

About this book

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Editors and Affiliations

  • Computer Science Department, University of Malaga, Malaga, Spain

    Javier Lopez

  • Department of Computer Science, University of California, Irvine, USA

    Gene Tsudik

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access