LEADER 05844nam 22008775 450 001 9910143884303321 005 20251116234256.0 010 $a3-540-36413-7 024 7 $a10.1007/3-540-36413-7 035 $a(CKB)1000000000211911 035 $a(SSID)ssj0000326462 035 $a(PQKBManifestationID)11297540 035 $a(PQKBTitleCode)TC0000326462 035 $a(PQKBWorkID)10297554 035 $a(PQKB)11629265 035 $a(DE-He213)978-3-540-36413-9 035 $a(MiAaPQ)EBC3071945 035 $a(PPN)155181351 035 $a(BIP)13523206 035 $a(BIP)8092734 035 $a(EXLCZ)991000000000211911 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in Communication Networks $eThird International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers /$fedited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (IX, 263 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2576 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-00420-3 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- Some Applications of Polynomials for the Design of Cryptographic Protocols -- Secure Multi-party Computation Made Simple -- Forward Security -- Forward Secrecy in Password-Only Key Exchange Protocols -- Weak Forward Security in Mediated RSA -- Foundations of Cryptography -- On the Power of Claw-Free Permutations -- Equivocable and Extractable Commitment Schemes -- An Improved Pseudorandom Generator Based on Hardness of Factoring -- Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions -- Key Management -- Efficient Re-keying Protocols for Multicast Encryption -- On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure -- A Group Key Distribution Scheme with Decentralised User Join -- Cryptanalysis -- On a Resynchronization Weakness in a Class of Combiners with Memory -- On Probability of Success in Linear and Differential Cryptanalysis -- Differential Cryptanalysis of a Reduced-Round SEED -- System Security -- Medical Information Privacy Assurance: Cryptographic and System Aspects -- A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code -- Signature Schemes -- How to Repair ESIGN -- Forward-Secure Signatures with Fast Key Update -- Constructing Elliptic Curves with Prescribed Embedding Degrees -- A Signature Scheme with Efficient Protocols -- Zero Knowledge -- Efficient Zero-Knowledge Proofs for Some Practical Graph Problems -- Reduction Zero-Knowledge -- A New Notion of Soundness in Bare Public-Key Model -- Information Theory and Secret Sharing -- Robust Information-Theoretic Private Information Retrieval -- Trading Players for Efficiency in Unconditional Multiparty Computation -- Secret Sharing Schemes on Access Structures with Intersection Number Equal to One. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Security in Communication Networks, SCN 2002, held in Amalfi, Italy in September 2002.The 24 revised full papers presented together with two invited papers were carefully selected from 90 submissions during two rounds of reviewing and revision. The papers are organized in topical sections on forward security, foundations of cryptography, key management, cryptanalysis, systems security, digital signature schemes, zero knowledge, and information theory and secret sharing. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2576 606 $aComputer networks 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 615 0$aComputer networks. 615 0$aData encryption (Computer science) 615 0$aOperating systems (Computers) 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 676 $a005.8 702 $aCimato$b Stelvio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGaldi$b Clemente$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPersiano$b Giuseppe$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSCN 2002 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143884303321 996 $aSecurity in Communication Networks$9772493 997 $aUNINA