LEADER 00712cam0 22002413 450 001 SOB003153 005 20210330060746.0 100 $a20040211dS.D. |||||ita|0103 ba 101 $aita 102 $aIT 200 1 $aAppunti$fSandro Penna 210 $aMilano$cEdizioni della Meridiana$ds.d. 215 $a80 p.$d16 cm. 700 1$aPenna$b, Sandro$3AF00004814$4070$0218081 801 0$aIT$bUNISOB$c20210330$gRICA 850 $aUNISOB 852 $aUNISOB$j851$m3389 912 $aSOB003153 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a851$b000165$gSI$d3389$racquisto$1carrano$2UNISOB$3UNISOB$420120217123151.0$520210330060746.0$6Spinosa 996 $aAppunti$91731097 997 $aUNISOB LEADER 05004nam 22009255 450 001 9910483850803321 005 20251226200334.0 010 $a3-540-76969-2 024 7 $a10.1007/978-3-540-76969-9 035 $a(CKB)1000000000490476 035 $a(SSID)ssj0000317075 035 $a(PQKBManifestationID)11246644 035 $a(PQKBTitleCode)TC0000317075 035 $a(PQKBWorkID)10287272 035 $a(PQKB)10893313 035 $a(DE-He213)978-3-540-76969-9 035 $a(MiAaPQ)EBC4975801 035 $a(MiAaPQ)EBC336929 035 $a(MiAaPQ)EBC6698741 035 $a(Au-PeEL)EBL336929 035 $a(OCoLC)191471550 035 $a(Au-PeEL)EBL6698741 035 $a(PPN)123729173 035 $a(MiAaPQ)EBC5595530 035 $a(EXLCZ)991000000000490476 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security $e6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings /$fedited by Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XII, 286 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4856 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-76968-4 320 $aIncludes bibliographical references and index. 327 $aSignatures -- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles -- A Generic Construction for Universally-Convertible Undeniable Signatures -- Fast Digital Signature Algorithm Based on Subgraph Isomorphism -- Efficient ID-Based Digital Signatures with Message Recovery -- Network Security -- Achieving Mobility and Anonymity in IP-Based Networks -- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary -- Forward-Secure Key Evolution in Wireless Sensor Networks -- A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations -- An Intelligent Network-Warning Model with Strong Survivability -- Running on Karma ? P2P Reputation and Currency Systems -- Secure Keyword Search and Private Information Retrieval -- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption -- Extended Private Information Retrieval and Its Application in Biometrics Authentications -- Public Key Encryption -- Strongly Secure Certificateless Public Key Encryption Without Pairing -- Intrusion Detection -- Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems -- Email Security -- How to Secure Your Email Address Book and Beyond -- Denial of Service Attacks -- Toward Non-parallelizable Client Puzzles -- Authentication -- Anonymity 2.0 ? X.509 Extensions Supporting Privacy-Friendly Authentication. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4856 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aCryptology 606 $aData and Information Security 606 $aIT Operations 606 $aComputers and Society 606 $aAlgorithms 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aAlgorithms. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aAlgorithms. 676 $a005.8 686 $aDAT 461f$2stub 702 $aBao$b Feng$cDr, 712 02$aInternational Association for Cryptologic Research. 712 12$aInternational Conference on Cryptology and Network Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483850803321 996 $aCryptology and Network Security$92968064 997 $aUNINA