LEADER 05243nam 22008415 450 001 996465667703316 005 20200706004804.0 010 $a3-540-36413-7 024 7 $a10.1007/3-540-36413-7 035 $a(CKB)1000000000211911 035 $a(SSID)ssj0000326462 035 $a(PQKBManifestationID)11297540 035 $a(PQKBTitleCode)TC0000326462 035 $a(PQKBWorkID)10297554 035 $a(PQKB)11629265 035 $a(DE-He213)978-3-540-36413-9 035 $a(MiAaPQ)EBC3071945 035 $a(PPN)155181351 035 $a(EXLCZ)991000000000211911 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in Communication Networks$b[electronic resource] $eThird International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers /$fedited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (IX, 263 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2576 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-00420-3 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- Some Applications of Polynomials for the Design of Cryptographic Protocols -- Secure Multi-party Computation Made Simple -- Forward Security -- Forward Secrecy in Password-Only Key Exchange Protocols -- Weak Forward Security in Mediated RSA -- Foundations of Cryptography -- On the Power of Claw-Free Permutations -- Equivocable and Extractable Commitment Schemes -- An Improved Pseudorandom Generator Based on Hardness of Factoring -- Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions -- Key Management -- Efficient Re-keying Protocols for Multicast Encryption -- On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure -- A Group Key Distribution Scheme with Decentralised User Join -- Cryptanalysis -- On a Resynchronization Weakness in a Class of Combiners with Memory -- On Probability of Success in Linear and Differential Cryptanalysis -- Differential Cryptanalysis of a Reduced-Round SEED -- System Security -- Medical Information Privacy Assurance: Cryptographic and System Aspects -- A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code -- Signature Schemes -- How to Repair ESIGN -- Forward-Secure Signatures with Fast Key Update -- Constructing Elliptic Curves with Prescribed Embedding Degrees -- A Signature Scheme with Efficient Protocols -- Zero Knowledge -- Efficient Zero-Knowledge Proofs for Some Practical Graph Problems -- Reduction Zero-Knowledge -- A New Notion of Soundness in Bare Public-Key Model -- Information Theory and Secret Sharing -- Robust Information-Theoretic Private Information Retrieval -- Trading Players for Efficiency in Unconditional Multiparty Computation -- Secret Sharing Schemes on Access Structures with Intersection Number Equal to One. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2576 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 676 $a005.8 702 $aCimato$b Stelvio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGaldi$b Clemente$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPersiano$b Giuseppe$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSCN 2002 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465667703316 996 $aSecurity in Communication Networks$9772493 997 $aUNISA