Religious & Philosophical

405 pages
15 views

A killer application for pairings: authenticated key establishment in underwater wireless sensor networks

of 405
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Share
Description
A killer application for pairings: authenticated key establishment in underwater wireless sensor networks
Transcript
  Lecture Notes in Computer Science 5339 Commenced Publication in 1973 Founding and Former Series Editors:Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison  Lancaster University, UK  Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK  Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern  ETH Zurich, Switzerland  John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland  C. Pandu Rangan  Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan  Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum  Max-Planck Institute of Computer Science, Saarbruecken, Germany  Matthew K.Franklin Lucas Chi Kwong HuiDuncan S.Wong (Eds.) Cryptologyand Network Security 7th International Conference, CANS 2008Hong-Kong, China, December 2-4, 2008Proceedings  1 3  Volume EditorsMatthew K. FranklinUniversity of CaliforniaDepartment of Computer ScienceDavis, CA, USAE-mail: franklin@cs.ucdavis.eduLucas Chi Kwong HuiThe University of Hong KongDepartment of Computer ScienceHong Kong, ChinaE-mail: hui@cs.hku.hk Duncan S. WongCity University of Hong KongDepartment of Computer ScienceHong Kong, ChinaE-mail: duncan@cityu.edu.hk Library of Congress Control Number: 2008939862CR Subject Classification (1998): E.3, D.4.6, F.2.1, C.2, J.1, K.4.4, K.6.5LNCS Sublibrary: SL 4 – Security and CryptologyISSN0302-9743ISBN-103-540-89640-6 Springer Berlin Heidelberg NewYork ISBN-13978-3-540-89640-1 Springer Berlin Heidelberg NewYork  This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.Springer is a part of Springer Science+Business Mediaspringer.com© Springer-Verlag Berlin Heidelberg 2008Printed in GermanyTypesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, IndiaPrinted on acid-free paper SPIN: 12577507 06/3180 5 4 3 2 1 0  Preface The seventh internationalconference on Cryptologyand NetworkSecurity (CANS2008) was held at HKU Town Center, Hong Kong, China, during December 2–4,2008. The conference was organized by the Department of Computer Science,the University of Hong Kong, and was fully supported by the Center for Informa-tion Security and Cryptography at the University of Hong Kong, the CyberportInstitute of Hong Kong at the University of Hong Kong and the Department of Computer Science at the City University of Hong Kong.The goal of CANS is to promote research on all aspects of network security,as well as to build a bridge between research on cryptography and networksecurity. Previous CANS conferences have been held in Taipei, Taiwan (2001),San Francisco, USA (2002), Miami, USA (2003), Xiamen, China (2005), Suzhou,China (2006), and Singapore (2007). The conference proceedings of recent yearswere published by Springer in the Lecture Notes in Computer Science series.The Program Committee received 73 submissions, and accepted 27 papersfor presentation. The final versions of the accepted papers, which the authorsfinalized on the basis of comments from the reviewers, were included in theproceedings. The reviewing process took nine weeks; each paper was carefullyevaluated by at least three members from the Program Committee. The indi-vidual reviewing phase was followed by a Web-based discussion. Based on thecomments and scores given by reviewers, the final decisions on acceptance weremade. We appreciate the hard work of the members of the Program Committeeand the external referees who gave many hours of their valuable time.In addition to the contributed papers, there were two invited talks. One wasgiven by Juan Garay and the other one was by Xiaoyun Wang.We would like to thank all the people involved in organizing this conference.In particular, we would like to thank the Organizing Committee members, col-leagues and our student helpers for their time and effort. Finally, we would liketo thank all the authors who submitted papers to the conference.December 2008 Matthew K. FranklinLucas Chi Kwong HuiDuncan S. Wong  Organization CANS 2008 was organized by the Department of Computer Science, The Uni-versity of Hong Kong, China, and held during December 2–4, 2008. General Chair Lucas C.K. Hui The University of Hong Kong, China Program Co-chairs Matt Franklin UC Davis, USADuncan S. Wong City University of Hong Kong, China Steering Committee Yvo Desmedt University College London, UKMatt Franklin UC Davis, USAYi Mu University of Wollongong, AustraliaDavid Pointcheval CNRS and ENS, FranceHuaxiong Wang Nanyang Technological University, Singapore Organizing Committee K.P. Chow The University of Hong Kong, ChinaBruce Cheung The University of Hong Kong, ChinaLucas C.K. Hui The University of Hong Kong, ChinaRaymond Szeto The University of Hong Kong, China Program Committee Michel Abdalla´Ecole Normale Sup´erieure, FranceJoonsang Baek I2R, SingaporeFeng Bao I2R, SingaporeHao Chen East China Normal University, ChinaLiqun Chen HP Bristol Labs, UKMike Burmester Florida State University, USAEd Dawson QUT, AustraliaRobert Deng SMU, SingaporeDengguo Feng Chinese Academy of Sciences, ChinaEiichiro Fujisaki NTT Labs, Japan
Related Documents
View more...
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks
SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...

Sign Now!

We are very appreciated for your Prompt Action!

x