LEADER 04732nam 22007575 450 001 9910144928103321 005 20200704203821.0 010 $a3-540-68047-0 024 7 $a10.1007/3-540-62494-5 035 $a(CKB)1000000000234587 035 $a(SSID)ssj0000326468 035 $a(PQKBManifestationID)11268663 035 $a(PQKBTitleCode)TC0000326468 035 $a(PQKBWorkID)10284183 035 $a(PQKB)10417580 035 $a(DE-He213)978-3-540-68047-5 035 $a(PPN)155209906 035 $a(EXLCZ)991000000000234587 100 $a20121227d1997 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Protocols$b[electronic resource] $eInternational Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings /$fedited by Mark Lomas 205 $a1st ed. 1997. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1997. 215 $a1 online resource (VIII, 203 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1189 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-62494-5 327 $aOn cryptographic techniques for on-line bankcard payment transactions using open networks -- A certification scheme for electronic commerce -- Practical escrow cash systems -- NetCard ? A practical electronic-cash system -- Electronic payments of small amounts -- PayWord and MicroMint: Two simple micropayment schemes -- Transactions using bets -- Protocol failures for RSA-like functions using Lucas sequences and elliptic curves -- Efficient and provable security amplifications -- A comparison of RSA and the Naccache-Stern public-key cryptosystem -- IEEE P1363: A standard for RSA, Diffie-Hellman, and Elliptic-Curve cryptography (abstract) -- Efficient and secure conference-key distribution -- Directed signatures and application to threshold cryptosystems -- Key escrow in mutually mistrusting domains -- Automatic event-stream notarization using digital signatures -- Why isn't trust transitive? -- Securing the residential asynchronous transfer mode networks -- Visual cryptography II: Improving the contrast via the cover base. 330 $aThis book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on computer security, cryptology, and coding theory at the Isaac Newton Institute. The 17 revised full papers and one abstract included in the book were carefully selected. Among the topics addressed are several types of public key cryptosystems, digital cash, electronic commerce, digital signatures, and visual cryptography. Besides original theoretical results, the collection of papers show a strong applications-oriented component. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1189 606 $aCoding theory 606 $aInformation theory 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer communication systems 606 $aComputer mathematics 606 $aElectrical engineering 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputational Mathematics and Numerical Analysis$3https://scigraph.springernature.com/ontologies/product-market-codes/M1400X 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer communication systems. 615 0$aComputer mathematics. 615 0$aElectrical engineering. 615 14$aCoding and Information Theory. 615 24$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputer Communication Networks. 615 24$aComputational Mathematics and Numerical Analysis. 615 24$aCommunications Engineering, Networks. 676 $a005.8/2 702 $aLomas$b Mark$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910144928103321 996 $aSecurity Protocols$9772025 997 $aUNINA