Security Protocols [[electronic resource] ] : 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / / edited by Bruce Christianson, Bruno Crispo, Mark Lomas, Michael Roe |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (VIII, 220 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Algorithms Computer communication systems Combinatorics Electrical engineering Cryptology Algorithm Analysis and Problem Complexity Computer Communication Networks Communications Engineering, Networks |
ISBN | 3-540-69688-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure books: Protecting the distribution of knowledge -- Protocols using anonymous connections: Mobile applications -- Receipt-free electronic voting schemes for large scale elections -- Flexible internet secure transactions based on collaborative domains -- How to build evidence in a public-key infrastructure for multi-domain environments -- On signature schemes with threshold verification detecting malicious verifiers -- Open key exchange: How to defeat dictionary attacks without encrypting public keys -- Protocol interactions and the chosen protocol attack -- Binding bit patterns to real world entities -- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults -- Low cost attacks on tamper resistant devices -- Entity authentication and authenticated key transport protocols employing asymmetric techniques -- SG logic — a formal analysis technique for authentication protocols -- How to convert any digital signature scheme into a group signature scheme -- Threshold key-recovery systems for RSA -- A weakness of the Menezes-Vanstone cryptosystem -- On ideal non-perfect secret sharing schemes. |
Record Nr. | UNISA-996466083903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Protocols [[electronic resource] ] : 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / / edited by Bruce Christianson, Bruno Crispo, Mark Lomas, Michael Roe |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (VIII, 220 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Algorithms Computer networks Combinatorial analysis Electrical engineering Cryptology Algorithm Analysis and Problem Complexity Computer Communication Networks Combinatorics Communications Engineering, Networks |
ISBN | 3-540-69688-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure books: Protecting the distribution of knowledge -- Protocols using anonymous connections: Mobile applications -- Receipt-free electronic voting schemes for large scale elections -- Flexible internet secure transactions based on collaborative domains -- How to build evidence in a public-key infrastructure for multi-domain environments -- On signature schemes with threshold verification detecting malicious verifiers -- Open key exchange: How to defeat dictionary attacks without encrypting public keys -- Protocol interactions and the chosen protocol attack -- Binding bit patterns to real world entities -- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults -- Low cost attacks on tamper resistant devices -- Entity authentication and authenticated key transport protocols employing asymmetric techniques -- SG logic — a formal analysis technique for authentication protocols -- How to convert any digital signature scheme into a group signature scheme -- Threshold key-recovery systems for RSA -- A weakness of the Menezes-Vanstone cryptosystem -- On ideal non-perfect secret sharing schemes. |
Record Nr. | UNINA-9910144917403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security Protocols [[electronic resource] ] : International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings / / edited by Mark Lomas |
Edizione | [1st ed. 1997.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1997 |
Descrizione fisica | 1 online resource (VIII, 203 p.) |
Disciplina | 005.8/2 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Coding theory
Information theory Data encryption (Computer science) Algorithms Computer communication systems Computer mathematics Electrical engineering Coding and Information Theory Cryptology Algorithm Analysis and Problem Complexity Computer Communication Networks Computational Mathematics and Numerical Analysis Communications Engineering, Networks |
ISBN | 3-540-68047-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On cryptographic techniques for on-line bankcard payment transactions using open networks -- A certification scheme for electronic commerce -- Practical escrow cash systems -- NetCard — A practical electronic-cash system -- Electronic payments of small amounts -- PayWord and MicroMint: Two simple micropayment schemes -- Transactions using bets -- Protocol failures for RSA-like functions using Lucas sequences and elliptic curves -- Efficient and provable security amplifications -- A comparison of RSA and the Naccache-Stern public-key cryptosystem -- IEEE P1363: A standard for RSA, Diffie-Hellman, and Elliptic-Curve cryptography (abstract) -- Efficient and secure conference-key distribution -- Directed signatures and application to threshold cryptosystems -- Key escrow in mutually mistrusting domains -- Automatic event-stream notarization using digital signatures -- Why isn't trust transitive? -- Securing the residential asynchronous transfer mode networks -- Visual cryptography II: Improving the contrast via the cover base. |
Record Nr. | UNISA-996466236903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1997 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Protocols [[electronic resource] ] : International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings / / edited by Mark Lomas |
Edizione | [1st ed. 1997.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1997 |
Descrizione fisica | 1 online resource (VIII, 203 p.) |
Disciplina | 005.8/2 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Coding theory
Information theory Data encryption (Computer science) Algorithms Computer networks Computer science - Mathematics Electrical engineering Coding and Information Theory Cryptology Algorithm Analysis and Problem Complexity Computer Communication Networks Computational Mathematics and Numerical Analysis Communications Engineering, Networks |
ISBN | 3-540-68047-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On cryptographic techniques for on-line bankcard payment transactions using open networks -- A certification scheme for electronic commerce -- Practical escrow cash systems -- NetCard — A practical electronic-cash system -- Electronic payments of small amounts -- PayWord and MicroMint: Two simple micropayment schemes -- Transactions using bets -- Protocol failures for RSA-like functions using Lucas sequences and elliptic curves -- Efficient and provable security amplifications -- A comparison of RSA and the Naccache-Stern public-key cryptosystem -- IEEE P1363: A standard for RSA, Diffie-Hellman, and Elliptic-Curve cryptography (abstract) -- Efficient and secure conference-key distribution -- Directed signatures and application to threshold cryptosystems -- Key escrow in mutually mistrusting domains -- Automatic event-stream notarization using digital signatures -- Why isn't trust transitive? -- Securing the residential asynchronous transfer mode networks -- Visual cryptography II: Improving the contrast via the cover base. |
Record Nr. | UNINA-9910144928103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1997 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|