Skip to main content
  • Conference proceedings
  • © 2009

Applied Cryptography and Network Security

7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5536)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Secure Computation

    1. Novel Precomputation Schemes for Elliptic Curve Cryptosystems

      • Patrick Longa, Catherine Gebotys
      Pages 71-88
    2. Practical Secure Evaluation of Semi-private Functions

      • Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 89-106
    3. Secure Hamming Distance Based Computation and Its Applications

      • Ayman Jarrous, Benny Pinkas
      Pages 107-124
    4. Efficient Robust Private Set Intersection

      • Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
      Pages 125-142
  3. Public-Key Encryption

    1. A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack

      • Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
      Pages 143-155
    2. An Efficient Identity-Based Online/Offline Encryption Scheme

      • Joseph K. Liu, Jianying Zhou
      Pages 156-167
    3. Dual-Policy Attribute Based Encryption

      • Nuttapong Attrapadung, Hideki Imai
      Pages 168-185
  4. Network Security I

    1. A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks

      • Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
      Pages 219-237
  5. Traitor Tracing

    1. Tracing and Revoking Pirate Rebroadcasts

      • Aggelos Kiayias, Serdar Pehlivanoglu
      Pages 253-271
  6. Authentication and Anonymity

    1. Efficient Deniable Authentication for Signatures

      • Jean Monnerat, Sylvain Pasini, Serge Vaudenay
      Pages 272-291
    2. Homomorphic MACs: MAC-Based Integrity for Network Coding

      • Shweta Agrawal, Dan Boneh
      Pages 292-305
    3. Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN

      • Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo
      Pages 306-323

Other Volumes

  1. Applied Cryptography and Network Security

About this book

This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009. The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.

Editors and Affiliations

  • École Normale Supérieure, Paris Cedex 05, France

    Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access