Skip to main content
Book cover

Applied Cryptography and Network Security

Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings

  • Conference proceedings
  • © 2004

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3089)

Included in the following conference series:

Conference proceedings info: ACNS 2004.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (36 papers)

  1. Security of Deployed Systems

  2. Cryptosystems: Design and Analysis

  3. Cryptographic Protocols

  4. Side Channels and Protocol Analysis

  5. Intrusion Detection and DoS

  6. Cryptographic Algorithms

Other volumes

  1. Applied Cryptography and Network Security

Keywords

About this book

The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8–11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag. The area of research that ACNS covers has been gaining importance in recent years due to the development of the Internet, which, in turn, implies global exposure of computing resources. Many ?elds of research were covered by the program of this track, presented in this proceedings volume. We feel that the papers herein indeed re?ect the state of the art in security and cryptography research, worldwide. The program committee of the conference received a total of 297 submissions from all over the world, of which 36 submissions were selected for presentation during the academic track. In addition to this track, the conference also hosted a technical/industrial track of presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas.

Editors and Affiliations

  • Indiana University, Bloomington, USA

    Markus Jakobsson

  • Computer Science Department, Google Inc. and Columbia University, New York NY, USA

    Moti Yung

  • Cryptography and Security Department Institute for Infocomm Research, Singapore

    Jianying Zhou

Bibliographic Information

Publish with us