Save today: Get 40% off titles in Popular Science!

Security and Cryptology

Applied Cryptography and Network Security

8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings

Editors: Zhou, Jianying, Yung, Moti (Eds.)

Free Preview

Buy this book

eBook $109.00
price for USA in USD
  • ISBN 978-3-642-13708-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA in USD
About this book

ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris,France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track.

Table of contents (32 chapters)

Table of contents (32 chapters)
  • On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption

    Pages 1-18

    Bauer, Aurélie (et al.)

  • How to Construct Interval Encryption from Binary Tree Encryption

    Pages 19-34

    Lin, Huang (et al.)

  • Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions

    Pages 35-52

    Boyen, Xavier (et al.)

  • Trapdoor Sanitizable Signatures Made Easy

    Pages 53-68

    Yum, Dae Hyun (et al.)

  • Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs

    Pages 69-86

    Rückert, Markus (et al.)

Buy this book

eBook $109.00
price for USA in USD
  • ISBN 978-3-642-13708-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA in USD
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Applied Cryptography and Network Security
Book Subtitle
8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings
Editors
  • Jianying Zhou
  • Moti Yung
Series Title
Security and Cryptology
Series Volume
6123
Copyright
2010
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-642-13708-2
DOI
10.1007/978-3-642-13708-2
Softcover ISBN
978-3-642-13707-5
Edition Number
1
Number of Pages
XIII, 564
Number of Illustrations
83 b/w illustrations
Topics