top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security Protocols [[electronic resource] ] : 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / / edited by Bruce Christianson, Bruno Crispo, Mark Lomas, Michael Roe
Security Protocols [[electronic resource] ] : 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / / edited by Bruce Christianson, Bruno Crispo, Mark Lomas, Michael Roe
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (VIII, 220 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Algorithms
Computer communication systems
Combinatorics
Electrical engineering
Cryptology
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Communications Engineering, Networks
ISBN 3-540-69688-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure books: Protecting the distribution of knowledge -- Protocols using anonymous connections: Mobile applications -- Receipt-free electronic voting schemes for large scale elections -- Flexible internet secure transactions based on collaborative domains -- How to build evidence in a public-key infrastructure for multi-domain environments -- On signature schemes with threshold verification detecting malicious verifiers -- Open key exchange: How to defeat dictionary attacks without encrypting public keys -- Protocol interactions and the chosen protocol attack -- Binding bit patterns to real world entities -- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults -- Low cost attacks on tamper resistant devices -- Entity authentication and authenticated key transport protocols employing asymmetric techniques -- SG logic — a formal analysis technique for authentication protocols -- How to convert any digital signature scheme into a group signature scheme -- Threshold key-recovery systems for RSA -- A weakness of the Menezes-Vanstone cryptosystem -- On ideal non-perfect secret sharing schemes.
Record Nr. UNISA-996466083903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security Protocols [[electronic resource] ] : 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / / edited by Bruce Christianson, Bruno Crispo, Mark Lomas, Michael Roe
Security Protocols [[electronic resource] ] : 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / / edited by Bruce Christianson, Bruno Crispo, Mark Lomas, Michael Roe
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (VIII, 220 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Algorithms
Computer communication systems
Combinatorics
Electrical engineering
Cryptology
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Communications Engineering, Networks
ISBN 3-540-69688-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure books: Protecting the distribution of knowledge -- Protocols using anonymous connections: Mobile applications -- Receipt-free electronic voting schemes for large scale elections -- Flexible internet secure transactions based on collaborative domains -- How to build evidence in a public-key infrastructure for multi-domain environments -- On signature schemes with threshold verification detecting malicious verifiers -- Open key exchange: How to defeat dictionary attacks without encrypting public keys -- Protocol interactions and the chosen protocol attack -- Binding bit patterns to real world entities -- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults -- Low cost attacks on tamper resistant devices -- Entity authentication and authenticated key transport protocols employing asymmetric techniques -- SG logic — a formal analysis technique for authentication protocols -- How to convert any digital signature scheme into a group signature scheme -- Threshold key-recovery systems for RSA -- A weakness of the Menezes-Vanstone cryptosystem -- On ideal non-perfect secret sharing schemes.
Record Nr. UNINA-9910144917403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Protocols [[electronic resource] ] : International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings / / edited by Mark Lomas
Security Protocols [[electronic resource] ] : International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings / / edited by Mark Lomas
Edizione [1st ed. 1997.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1997
Descrizione fisica 1 online resource (VIII, 203 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory
Information theory
Data encryption (Computer science)
Algorithms
Computer communication systems
Computer mathematics
Electrical engineering
Coding and Information Theory
Cryptology
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Computational Mathematics and Numerical Analysis
Communications Engineering, Networks
ISBN 3-540-68047-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On cryptographic techniques for on-line bankcard payment transactions using open networks -- A certification scheme for electronic commerce -- Practical escrow cash systems -- NetCard — A practical electronic-cash system -- Electronic payments of small amounts -- PayWord and MicroMint: Two simple micropayment schemes -- Transactions using bets -- Protocol failures for RSA-like functions using Lucas sequences and elliptic curves -- Efficient and provable security amplifications -- A comparison of RSA and the Naccache-Stern public-key cryptosystem -- IEEE P1363: A standard for RSA, Diffie-Hellman, and Elliptic-Curve cryptography (abstract) -- Efficient and secure conference-key distribution -- Directed signatures and application to threshold cryptosystems -- Key escrow in mutually mistrusting domains -- Automatic event-stream notarization using digital signatures -- Why isn't trust transitive? -- Securing the residential asynchronous transfer mode networks -- Visual cryptography II: Improving the contrast via the cover base.
Record Nr. UNINA-9910144928103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1997
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Protocols [[electronic resource] ] : International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings / / edited by Mark Lomas
Security Protocols [[electronic resource] ] : International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings / / edited by Mark Lomas
Edizione [1st ed. 1997.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1997
Descrizione fisica 1 online resource (VIII, 203 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory
Information theory
Data encryption (Computer science)
Algorithms
Computer communication systems
Computer mathematics
Electrical engineering
Coding and Information Theory
Cryptology
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Computational Mathematics and Numerical Analysis
Communications Engineering, Networks
ISBN 3-540-68047-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On cryptographic techniques for on-line bankcard payment transactions using open networks -- A certification scheme for electronic commerce -- Practical escrow cash systems -- NetCard — A practical electronic-cash system -- Electronic payments of small amounts -- PayWord and MicroMint: Two simple micropayment schemes -- Transactions using bets -- Protocol failures for RSA-like functions using Lucas sequences and elliptic curves -- Efficient and provable security amplifications -- A comparison of RSA and the Naccache-Stern public-key cryptosystem -- IEEE P1363: A standard for RSA, Diffie-Hellman, and Elliptic-Curve cryptography (abstract) -- Efficient and secure conference-key distribution -- Directed signatures and application to threshold cryptosystems -- Key escrow in mutually mistrusting domains -- Automatic event-stream notarization using digital signatures -- Why isn't trust transitive? -- Securing the residential asynchronous transfer mode networks -- Visual cryptography II: Improving the contrast via the cover base.
Record Nr. UNISA-996466236903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1997
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui