Skip to main content
  • Conference proceedings
  • © 2005

Cryptology and Network Security

4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3810)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CANS: International Conference on Cryptology and Network Security

Conference proceedings info: CANS 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Cryptanalysis

    1. The Second-Preimage Attack on MD4

      • Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
      Pages 1-12
    2. On the Security of Certificateless Signature Schemes from Asiacrypt 2003

      • Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
      Pages 13-25
  3. Intrusion Detection and Viruses

    1. An Immune-Based Model for Computer Virus Detection

      • Tao Li, Xiaojie Liu, Hongbin Li
      Pages 59-71
    2. A New Model for Dynamic Intrusion Detection

      • Tao Li, Xiaojie Liu, Hongbin Li
      Pages 72-84
  4. Authentication and Signature

    1. ID-Based Aggregate Signatures from Bilinear Pairings

      • Jing Xu, Zhenfeng Zhang, Dengguo Feng
      Pages 110-119
    2. Efficient Identity-Based Signatures and Blind Signatures

      • Zhenjie Huang, Kefei Chen, Yumin Wang
      Pages 120-133
  5. Signcryption

    1. Two Proxy Signcryption Schemes from Bilinear Pairings

      • Qin Wang, Zhenfu Cao
      Pages 161-171
    2. Constructing Secure Warrant-Based Proxy Signcryption Schemes

      • Yuan Zhou, Zhenfu Cao, Rongxing Lu
      Pages 172-185
  6. E-mail Security

    1. Design and Implementation of an Inline Certified E-mail Service

      • Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
      Pages 186-199
    2. Efficient Identity-Based Protocol for Fair Certified E-mail Delivery

      • Zhenfeng Zhang, Jing Xu, Dengguo Feng
      Pages 200-210
  7. Cryptosystems

    1. Similar Keys of Multivariate Quadratic Public Key Cryptosystems

      • Yuh-Hua Hu, Lih-Chung Wang, Chun-Yen Chou, Feipei Lai
      Pages 211-222

Other Volumes

  1. Cryptology and Network Security

Editors and Affiliations

  • Department of Computer Science, University College London,  

    Yvo G. Desmedt

  • Centre for Advanced Computing - Algorithms and Cryptography Department of Computing, Macquarie University, Australia

    Huaxiong Wang

  • Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Australia

    Yi Mu

  • Fujian Normal University, Fuzhou, China

    Yongqing Li

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access