ACNS 2005 Accepted Papers (Academic Track)

Searching for High-Value Rare Events with Uncheatable Grid Computing
Wenliang Du, Syracuse University
Michael Goodrich, Univ. of California, Irvine
New Signature Schemes with Coupons and Tight Reduction
Benoit Chevallier-Mames, Gemplus and Ecole Normale Superieure
Efficient Identity Based Ring Signature
Sherman S.M. Chow. University of Hong Kong.
S.M. Yiu. University of Hong Kong.
Lucas C.K. Hui. University of Hong Kong.
Short Signature and Universal Designated Verifier Signature Without Random Oracles
Rui Zhang, University of Tokyo
Jun Furukawa, NEC Corporation
Hideki Imai, University of Tokyo
Dynamic k-Times Anonymous Authentication
Lan Nguyen. SITACS, University of Wollongong, Australia
Rei Safavi-Naini. SITACS, University of Wollongong, Australia
Quantifying Security in Hybrid Cellular Networks
Markus Jakobsson, School of Informatics at Indiana University Bloomington
Liu Yang, Software Engineering College, Sichuan University, China
Two-Server Password-Only Authenticated Key Exchange
Jonathan Katz, University of Maryland
Phil MacKenzie, DoCoMo Labs
Gelareh Taban, University of Maryland
Virgil Gligor, University of Maryland
Thompson's Group and Public Key Cryptography
Vladimir Shpilrain, The City College of New York
Alexander Ushakov, CUNY Graduate Center
Rainbow, a New Multivariable Polynomial Signature Scheme
Jintai Ding, University of Cincinnati
Dieter Schmidt, University of Cincinnati
OACerts: Oblivious Attribute Certificates
Jiangtao Li, Purdue University
Ninghui Li, Purdue University
Robust Key Extraction From Physical Uncloneable Functions
Boris Skoric (Philips Research Laboratories)
Pim Tuyls (Philips Research Laboratories)
Wil Ophey (Philips Research Laboratories)
Identity Based Encryption Without Redundancy
Benoit Libert, UCL Crypto Group
Jean-Jacques Quisquater, UCL Crypto Group
Messin' with Texas, Deriving Mother's Maiden Names Using Public Records
Virgil Griffith, Indiana University
Markus Jakobsson, Indiana University
Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications
Flavio D. Garcia, Radboud University, Netherlands
Jaap-Henk Hoepman, Radboud University, Netherlands
Privacy Preserving Keyword Searches on Remote Encrypted Data
Yan-Cheng Chang, Harvard University
Michael Mitzenmacher, Harvard University
Efficient Constructions for One-way Hash Chains
Yih-Chun Hu, UC Berkeley
Markus Jakobsson, Indiana University
Adrian Perrig, CMU
Mitigating Network Denial-of-Service through Diversity-Based Traffic Management
Ashraf Matrawy, Carleton University
Anil Somayaji, Carleton University
Paul C. van Oorschot, Carleton University
Building Reliable Mix Networks with Fair Exchange
Michael K. Reiter, CMU
XiaoFeng Wang, Indiana University at Bloomington
Matthew Wright, UMass-Amherst
Intrusion-Resilient Secure Channels
Gene Itkis, Boston University
Robert McNerney, Jr., Boston University
Scott W. Rossell, Boston University
Optimal Asymmetric Encryption and Signature Paddings
Benoit Chevallier-Mames, Gemplus
Duong Hieu Phan, Ecole Normale Superieure
David Pointcheval, Ecole Normale Superieure
A Traitor Tracing Scheme Based on RSA for Fast Decryption
John P. McGregor, Princeton University
Yiqun Lisa Yin, Princeton University
Ruby B. Lee, Princeton University
Non-interactive Zero-Knowledge Arguments for Voting
Jens Groth, UCLA
Efficient Security Mechanisms For Overlay Multicast-based Content Distribution
Sencun Zhu, Pennsylvania State University
Chao Yao, George Mason University
Donggang Liu, North Carolina State University
Sanjeev Setia, George Mason University
Sushil Jajodia, George Mason University
Strengthening Password-based Authentication Protocols Against Online Dictionary Attacks
Peng Wang, University of Minnesota
Yongdae Kim, University of Minnesota
Vishal Kher, University of Minnesota
Taekyoung Kwon, Sejong University, Korea
Badger - A Fast and Provably Secure MAC
Martin Boesgaard (Cryptico A/S)
Thomas Christensen (Cryptico A/S)
Erik Zenner (Cryptico A/S)
Efficient Anonymous Roaming and Its Security Analysis
Guomin Yang, Duncan S. Wong, and Xiaotie Deng, City University of Hong Kong
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
Abdulrahman Alharby, University of Tokyo
Hideki Imai, University of Tokyo
Digital Signatures Do Not Guarantee Exclusive Ownership
Thomas Pornin, Cryptolog
Julien P. Stern, Cryptolog
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
SeongHan Shin, University of Tokyo
Kazukuni Kobara, University of Tokyo
Hideki Imai, The University of Tokyo
N-party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
Jin Wook Byun, Korea University
Dong Hoon Lee, Korea University
An Efficient Solution to the Millionares' Problem Based on Homomorphic Encryption
Hsiao-Ying Lin, National Chiao Tung University, Taiwan
Wen-Guey Tzeng, National Chiao Tung University, Taiwan
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme
Raphael C.-W. Phan, Swinburne University of Technology
Bok-Min Goi, Multimedia University.
SCARE of the DES
Remy Daudigny DCSSI Crypto Lab
Herve Ledig DCSSI Crypto Lab
Frederic Muller DCSSI Crypto Lab
Frederic Valette DCSSI Crypto Lab
Indexing Information for Data Forensics
Mikhail Atallah, Purdue University
Michael T. Goodrich, UC Irvine
Roberto Tamassia, Brown University
Model Generalization and Its Implications on Intrusion Detection
Zhuowei Li, Nanyang Technological University, Singapore
Jianying Zhou, Institute of Infocomm Research, Singapore
Amitabha Das, Nanyang Technological University, Singapore