05243nam 22008415 450 99646566770331620200706004804.03-540-36413-710.1007/3-540-36413-7(CKB)1000000000211911(SSID)ssj0000326462(PQKBManifestationID)11297540(PQKBTitleCode)TC0000326462(PQKBWorkID)10297554(PQKB)11629265(DE-He213)978-3-540-36413-9(MiAaPQ)EBC3071945(PPN)155181351(EXLCZ)99100000000021191120121227d2003 u| 0engurnn|008mamaatxtccrSecurity in Communication Networks[electronic resource] Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers /edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (IX, 263 p.) Lecture Notes in Computer Science,0302-9743 ;2576Bibliographic Level Mode of Issuance: Monograph3-540-00420-3 Includes bibliographical references and index.Invited Talks -- Some Applications of Polynomials for the Design of Cryptographic Protocols -- Secure Multi-party Computation Made Simple -- Forward Security -- Forward Secrecy in Password-Only Key Exchange Protocols -- Weak Forward Security in Mediated RSA -- Foundations of Cryptography -- On the Power of Claw-Free Permutations -- Equivocable and Extractable Commitment Schemes -- An Improved Pseudorandom Generator Based on Hardness of Factoring -- Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions -- Key Management -- Efficient Re-keying Protocols for Multicast Encryption -- On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure -- A Group Key Distribution Scheme with Decentralised User Join -- Cryptanalysis -- On a Resynchronization Weakness in a Class of Combiners with Memory -- On Probability of Success in Linear and Differential Cryptanalysis -- Differential Cryptanalysis of a Reduced-Round SEED -- System Security -- Medical Information Privacy Assurance: Cryptographic and System Aspects -- A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code -- Signature Schemes -- How to Repair ESIGN -- Forward-Secure Signatures with Fast Key Update -- Constructing Elliptic Curves with Prescribed Embedding Degrees -- A Signature Scheme with Efficient Protocols -- Zero Knowledge -- Efficient Zero-Knowledge Proofs for Some Practical Graph Problems -- Reduction Zero-Knowledge -- A New Notion of Soundness in Bare Public-Key Model -- Information Theory and Secret Sharing -- Robust Information-Theoretic Private Information Retrieval -- Trading Players for Efficiency in Unconditional Multiparty Computation -- Secret Sharing Schemes on Access Structures with Intersection Number Equal to One.Lecture Notes in Computer Science,0302-9743 ;2576Computer communication systemsData encryption (Computer science)Operating systems (Computers)AlgorithmsComputers and civilizationComputersLaw and legislationComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computer communication systems.Data encryption (Computer science).Operating systems (Computers).Algorithms.Computers and civilization.Computers.Law and legislation.Computer Communication Networks.Cryptology.Operating Systems.Algorithm Analysis and Problem Complexity.Computers and Society.Legal Aspects of Computing.005.8Cimato Stelvioedthttp://id.loc.gov/vocabulary/relators/edtGaldi Clementeedthttp://id.loc.gov/vocabulary/relators/edtPersiano Giuseppeedthttp://id.loc.gov/vocabulary/relators/edtSCN 2002MiAaPQMiAaPQMiAaPQBOOK996465667703316Security in Communication Networks772493UNISA