LEADER 04686nam 2200661 450 001 996465663903316 005 20211008224746.0 010 $a3-540-85855-5 024 7 $a10.1007/978-3-540-85855-3 035 $a(CKB)1000000000490950 035 $a(SSID)ssj0000716642 035 $a(PQKBManifestationID)11477557 035 $a(PQKBTitleCode)TC0000716642 035 $a(PQKBWorkID)10724149 035 $a(PQKB)11537059 035 $a(DE-He213)978-3-540-85855-3 035 $a(MiAaPQ)EBC3063610 035 $a(MiAaPQ)EBC6511604 035 $a(Au-PeEL)EBL6511604 035 $a(OCoLC)288473479 035 $z(PPN)128008601 035 $a(PPN)12812637X 035 $a(EXLCZ)991000000000490950 100 $a20211008d2008 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aSecurity and cryptography for networks $e6th international conference, scn 2008, amalfi, italy, september 10-12, 2008, proceedings /$fedited by Rafail Ostrovsky, Roberto de Prisco, Ivan Visconti 205 $a1st ed. 2008. 210 1$aBerlin, Germany :$cSpringer,$d[2008] 210 4$dİ2008 215 $a1 online resource (XI, 423 p.) 225 1 $aSecurity and Cryptology ;$v5229 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-85854-7 320 $aIncludes bibliographical references and index. 327 $aInvited Talk -- Storage Encryption: A Cryptographer?s View -- Session 1: Implementations -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A Cryptographic Link Layer for Local Area Networks -- Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification -- Session 2: Protocols I -- Privacy Preserving Data Mining within Anonymous Credential Systems -- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function -- Session 3: Encryption I -- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications -- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption -- Session 4: Encryption II -- General Certificateless Encryption and Timed-Release Encryption -- Efficient Certificate-Based Encryption in the Standard Model -- Session 5: Primitives -- An Improved Robust Fuzzy Extractor -- On Linear Secret Sharing for Connectivity in Directed Graphs -- Session 6: Signatures -- Expressive Subgroup Signatures -- Anonymous Proxy Signatures -- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact Hardware Implementations of the AES S-Box -- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes -- Full Cryptanalysis of LPS and Morgenstern Hash Functions -- A New DPA Countermeasure Based on Permutation Tables -- Session 8: Protocols II -- Simplified Submission of Inputs to Protocols -- Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited -- Session 9: Encryption III -- Linear Bandwidth Naccache-Stern Encryption -- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment -- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) -- Session 10: Key Exchange -- New Anonymity Notions for Identity-Based Encryption -- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort -- An Identity-Based Key Agreement Protocol for the Network Layer. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange. 410 0$aSecurity and Cryptology ;$v5229 606 $aComputer security$vCongresses 606 $aCryptography$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 615 0$aComputer security 615 0$aCryptography 615 0$aComputer networks$xSecurity measures 676 $a005.82 702 $aVisconti$b Ivan 702 $aGaray$b Juan A. 702 $aDe Prisco$b Roberto$f1968- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465663903316 996 $aSecurity and Cryptography for Networks$9774029 997 $aUNISA LEADER 02034nam 22005175 450 001 9910992793503321 005 20250330141058.0 010 $a981-9636-79-5 024 7 $a10.1007/978-981-96-3679-2 035 $a(CKB)38166491400041 035 $a(DE-He213)978-981-96-3679-2 035 $a(MiAaPQ)EBC31979948 035 $a(Au-PeEL)EBL31979948 035 $a(EXLCZ)9938166491400041 100 $a20250330d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aExtended Reality $eFirst International Conference, ICXR 2024, Xiamen, China, November 14?17, 2024, Proceedings /$fedited by Weitao Song, Frank Guan, Shuai Li, Guofeng Zhang 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (X, 330 p. 128 illus., 119 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15461 311 08$a981-9636-78-7 330 $aThis LNCS conference set constitutes the proceedings of the First International Conference on Extended Reality, ICXR 2024, Xiamen, China, held during November 14?17, 2024. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15461 606 $aVirtual reality 606 $aAugmented reality 606 $aVirtual and Augmented Reality 615 0$aVirtual reality. 615 0$aAugmented reality. 615 14$aVirtual and Augmented Reality. 676 $a006.8 702 $aSong$b Weitao$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGuan$b Frank$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Shuai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Guofeng$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910992793503321 996 $aExtended Reality$94343553 997 $aUNINA