top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Avdances in cryptology-ASIACRYPT '99 : international conference on the theory and application of cryptology and information security, Singapore, November 14-18, 1999 : proceedings / / Kwok Yan Lam, Eiji Okamoto, Chaoping Xing (editors)
Avdances in cryptology-ASIACRYPT '99 : international conference on the theory and application of cryptology and information security, Singapore, November 14-18, 1999 : proceedings / / Kwok Yan Lam, Eiji Okamoto, Chaoping Xing (editors)
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [1999]
Descrizione fisica 1 online resource (XII, 420 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Cryptography
ISBN 3-540-48000-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Modulus Search for Elliptic Curve Cryptosystems -- Asymmetric Key Cryptosystems -- On the Lai-Massey Scheme -- On Cryptographically Secure Vectorial Boolean Functions -- Analysis -- Equivalent Keys of HPC -- Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials -- Cryptanalysis of Two Cryptosystems Based on Group Actions -- Probabilistic Higher Order Differential Attack and Higher Order Bent Functions -- Elliptic Curve Cryptosystems -- Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field -- Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves -- Speeding up the Discrete Log Computation on Curves with Automorphisms -- ECC: Do We Need to Count? -- Elliptic Scalar Multiplication Using Point Halving -- Public Key Cryptosystems -- On the Design of RSA with Short Secret Exponent -- Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries -- Adaptively-Secure Optimal-Resilience Proactive RSA -- Integers and Computation -- Factorization of RSA-140 Using the Number Field Sieve -- How to Prove That a Committed Number Is Prime -- Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields -- General Adversaries in Unconditional Multi-party Computation -- Network Security -- Approximation Hardness and Secure Communication in Broadcast Channels -- Mix-Networks on Permutation Networks -- Secure Communication in an Unknown Network Using Certificates -- Random Number -- Linear Complexity versus Pseudorandomness: On Beth and Dai’s Result -- A Class of Explicit Perfect Multi-sequences -- Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function -- Key Management -- Doing More with Fewer Bits -- A Quick Group Key Distribution Scheme with “Entity Revocation” -- An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks -- Periodical Multi-secret Threshold Cryptosystems -- Authentication -- A Signature Scheme with Message Recovery as Secure as Discrete Logarithm -- A 3-Codes under Collusion Attacks -- Broadcast Authentication in Group Communication.
Record Nr. UNINA-9910143649603321
Berlin, Heidelberg : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Avdances in cryptology-ASIACRYPT '99 : international conference on the theory and application of cryptology and information security, Singapore, November 14-18, 1999 : proceedings / / Kwok Yan Lam, Eiji Okamoto, Chaoping Xing (editors)
Avdances in cryptology-ASIACRYPT '99 : international conference on the theory and application of cryptology and information security, Singapore, November 14-18, 1999 : proceedings / / Kwok Yan Lam, Eiji Okamoto, Chaoping Xing (editors)
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [1999]
Descrizione fisica 1 online resource (XII, 420 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Cryptography
ISBN 3-540-48000-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Modulus Search for Elliptic Curve Cryptosystems -- Asymmetric Key Cryptosystems -- On the Lai-Massey Scheme -- On Cryptographically Secure Vectorial Boolean Functions -- Analysis -- Equivalent Keys of HPC -- Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials -- Cryptanalysis of Two Cryptosystems Based on Group Actions -- Probabilistic Higher Order Differential Attack and Higher Order Bent Functions -- Elliptic Curve Cryptosystems -- Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field -- Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves -- Speeding up the Discrete Log Computation on Curves with Automorphisms -- ECC: Do We Need to Count? -- Elliptic Scalar Multiplication Using Point Halving -- Public Key Cryptosystems -- On the Design of RSA with Short Secret Exponent -- Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries -- Adaptively-Secure Optimal-Resilience Proactive RSA -- Integers and Computation -- Factorization of RSA-140 Using the Number Field Sieve -- How to Prove That a Committed Number Is Prime -- Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields -- General Adversaries in Unconditional Multi-party Computation -- Network Security -- Approximation Hardness and Secure Communication in Broadcast Channels -- Mix-Networks on Permutation Networks -- Secure Communication in an Unknown Network Using Certificates -- Random Number -- Linear Complexity versus Pseudorandomness: On Beth and Dai’s Result -- A Class of Explicit Perfect Multi-sequences -- Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function -- Key Management -- Doing More with Fewer Bits -- A Quick Group Key Distribution Scheme with “Entity Revocation” -- An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks -- Periodical Multi-secret Threshold Cryptosystems -- Authentication -- A Signature Scheme with Message Recovery as Secure as Discrete Logarithm -- A 3-Codes under Collusion Attacks -- Broadcast Authentication in Group Communication.
Record Nr. UNISA-996465840303316
Berlin, Heidelberg : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers / / edited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
Information and Communications Security [[electronic resource] ] : 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers / / edited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVIII, 486 p. 133 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computer communication systems
Management information systems
Computer science
Computers and civilization
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
Computers and Society
ISBN 3-319-29814-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466003403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers / / edited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
Information and Communications Security : 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers / / edited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVIII, 486 p. 133 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computer communication systems
Management information systems
Computer science
Computers and civilization
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
Computers and Society
ISBN 3-319-29814-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483704703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto
Information and Communications Security [[electronic resource] ] : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 572 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Management information systems
Computer science
Algorithms
Computer communication systems
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-30191-7
3-540-23563-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Minimal Assumptions of Group Signature Schemes -- Perfect Concurrent Signature Schemes -- New Identity-Based Ring Signature Schemes -- On the Security of a Multi-party Certified Email Protocol -- Robust Metering Schemes for General Access Structures -- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks -- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN -- Provably Secure Authenticated Tree Based Group Key Agreement -- Taxonomic Consideration to OAEP Variants and Their Security -- Factorization-Based Fail-Stop Signatures Revisited -- A Qualitative Evaluation of Security Patterns -- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases -- Volatile Memory Computer Forensics to Detect Kernel Level Compromise -- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet -- Hydan: Hiding Information in Program Binaries -- A Semi-fragile Steganographic Digital Signature for Images -- Identification of Traitors Using a Trellis -- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation -- Reflector Attack Traceback System with Pushback Based iTrace Mechanism -- Automatic Covert Channel Analysis of a Multilevel Secure Component -- Sound Approximations to Diffie-Hellman Using Rewrite Rules -- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks -- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm -- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure -- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection -- Threat Analysis on NEtwork MObility (NEMO) -- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept -- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) -- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management -- Security Analysis of the Generalized Self-shrinking Generator -- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario -- Transient Fault Induction Attacks on XTR -- Adaptive-CCA on OpenPGP Revisited -- A New Key-Insulated Signature Scheme -- Secure Hierarchical Identity Based Signature and Its Application -- Multi-designated Verifiers Signatures -- Dynamic Access Control for Multi-privileged Group Communications -- An Efficient Authentication Scheme Using Recovery Information in Signature -- Time-Scoped Searching of Encrypted Audit Logs -- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
Record Nr. UNISA-996465286403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto
Information and Communications Security : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 572 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Management information systems
Computer science
Algorithms
Computer communication systems
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-30191-7
3-540-23563-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Minimal Assumptions of Group Signature Schemes -- Perfect Concurrent Signature Schemes -- New Identity-Based Ring Signature Schemes -- On the Security of a Multi-party Certified Email Protocol -- Robust Metering Schemes for General Access Structures -- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks -- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN -- Provably Secure Authenticated Tree Based Group Key Agreement -- Taxonomic Consideration to OAEP Variants and Their Security -- Factorization-Based Fail-Stop Signatures Revisited -- A Qualitative Evaluation of Security Patterns -- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases -- Volatile Memory Computer Forensics to Detect Kernel Level Compromise -- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet -- Hydan: Hiding Information in Program Binaries -- A Semi-fragile Steganographic Digital Signature for Images -- Identification of Traitors Using a Trellis -- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation -- Reflector Attack Traceback System with Pushback Based iTrace Mechanism -- Automatic Covert Channel Analysis of a Multilevel Secure Component -- Sound Approximations to Diffie-Hellman Using Rewrite Rules -- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks -- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm -- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure -- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection -- Threat Analysis on NEtwork MObility (NEMO) -- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept -- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) -- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management -- Security Analysis of the Generalized Self-shrinking Generator -- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario -- Transient Fault Induction Attacks on XTR -- Adaptive-CCA on OpenPGP Revisited -- A New Key-Insulated Signature Scheme -- Secure Hierarchical Identity Based Signature and Its Application -- Multi-designated Verifiers Signatures -- Dynamic Access Control for Multi-privileged Group Communications -- An Efficient Authentication Scheme Using Recovery Information in Signature -- Time-Scoped Searching of Encrypted Audit Logs -- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
Record Nr. UNINA-9910144344703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Information Security [[electronic resource] ] : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (X, 322 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Operating systems (Computers)
Management information systems
Computer science
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Operating Systems
Management of Computing and Information Systems
ISBN 3-540-44456-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Copyright Protection -- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling -- Region-Based Watermarking by Distribution Adjustment -- Hiding Information in Color Images Using Small Color Palettes -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software -- Characteristics of Some Binary Codes for Fingerprinting -- E-Commerce -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees -- Unlinkable Divisible Electronic Cash -- Weighted One-Way Hash Chain and Its Applications -- Linkability in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key Management -- Probabilistic Methods in Multicast Key Management -- Classification of Authentication Protocols: A Practical Approach -- Exploring Fair Exchange Protocols Using Specification Animation -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation -- Network Security and Access Control -- An Efficient Protocol for Certified Electronic Mail -- Performance Analysis of Secure Web Server Based on SSL -- Sherlock: Commercial High Assurance Network Computing Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic Systems -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization -- A Signcryption Scheme Based on Integer Factorization.
Record Nr. UNISA-996466008803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Information Security : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (X, 322 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Operating systems (Computers)
Management information systems
Computer science
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Operating Systems
Management of Computing and Information Systems
ISBN 3-540-44456-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Copyright Protection -- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling -- Region-Based Watermarking by Distribution Adjustment -- Hiding Information in Color Images Using Small Color Palettes -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software -- Characteristics of Some Binary Codes for Fingerprinting -- E-Commerce -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees -- Unlinkable Divisible Electronic Cash -- Weighted One-Way Hash Chain and Its Applications -- Linkability in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key Management -- Probabilistic Methods in Multicast Key Management -- Classification of Authentication Protocols: A Practical Approach -- Exploring Fair Exchange Protocols Using Specification Animation -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation -- Network Security and Access Control -- An Efficient Protocol for Certified Electronic Mail -- Performance Analysis of Secure Web Server Based on SSL -- Sherlock: Commercial High Assurance Network Computing Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic Systems -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization -- A Signcryption Scheme Based on Integer Factorization.
Record Nr. UNINA-9910143608103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings / / edited by Eiji Okamoto, George Davida, Masahiro Mambo
Information Security [[electronic resource] ] : First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings / / edited by Eiji Okamoto, George Davida, Masahiro Mambo
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (XII, 364 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computer communication systems
Operating systems (Computers)
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Operating Systems
ISBN 3-540-69767-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A general theory of codes, II: Paradigms and homomorphisms -- Improving the higher order differential attack and cryptanalysis of the KN cipher -- An optimised linear attack on pseudorandom generators using a non-linear combiner -- Cryptanalysis of message authentication codes -- The least witness of a composite number -- Fast algorithm for finding a small root of a quadratic modular equation -- Modified Finite Automata Public Key Cryptosystem -- Modified ElGamal cryptosystem -- Remarks on blind decryption -- High-speed cryptography -- Secure applications of low-entropy keys -- A key escrow system of the RSA cryptosystem -- A key escrow system with protecting user's privacy by blind decoding -- Some recent research aspects of threshold cryptography -- A high-speed small RSA encryption LSI with low power dissipation -- The case for a secure multi-application smart card operating system -- An augmented family of cryptographic Parity Circuits -- A new byte-oriented block cipher -- Practice-oriented provable-security -- A framework for the management of information security -- Specifying security in a composite system -- On rough sets and inference analysis -- Arbitrated unconditionally secure authentication scheme with multi-senders -- Group signatures for hierarchical multigroups -- Threshold proxy signature schemes -- Signcryption and its applications in efficient public key solutions -- A new digital cash scheme based on blind Nyberg-Rueppel digital signature -- An incremental payment method for internet based streaming real-time media -- A new identity-based key exchange protocol minimizing computation and communication -- The application of ID-based key distribution systems to an elliptic curve -- On reconciliation of discrepant sequences shared through quantum mechanical channels.
Record Nr. UNINA-9910144913803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings / / edited by Eiji Okamoto, George Davida, Masahiro Mambo
Information Security [[electronic resource] ] : First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings / / edited by Eiji Okamoto, George Davida, Masahiro Mambo
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (XII, 364 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computer communication systems
Operating systems (Computers)
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Operating Systems
ISBN 3-540-69767-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A general theory of codes, II: Paradigms and homomorphisms -- Improving the higher order differential attack and cryptanalysis of the KN cipher -- An optimised linear attack on pseudorandom generators using a non-linear combiner -- Cryptanalysis of message authentication codes -- The least witness of a composite number -- Fast algorithm for finding a small root of a quadratic modular equation -- Modified Finite Automata Public Key Cryptosystem -- Modified ElGamal cryptosystem -- Remarks on blind decryption -- High-speed cryptography -- Secure applications of low-entropy keys -- A key escrow system of the RSA cryptosystem -- A key escrow system with protecting user's privacy by blind decoding -- Some recent research aspects of threshold cryptography -- A high-speed small RSA encryption LSI with low power dissipation -- The case for a secure multi-application smart card operating system -- An augmented family of cryptographic Parity Circuits -- A new byte-oriented block cipher -- Practice-oriented provable-security -- A framework for the management of information security -- Specifying security in a composite system -- On rough sets and inference analysis -- Arbitrated unconditionally secure authentication scheme with multi-senders -- Group signatures for hierarchical multigroups -- Threshold proxy signature schemes -- Signcryption and its applications in efficient public key solutions -- A new digital cash scheme based on blind Nyberg-Rueppel digital signature -- An incremental payment method for internet based streaming real-time media -- A new identity-based key exchange protocol minimizing computation and communication -- The application of ID-based key distribution systems to an elliptic curve -- On reconciliation of discrepant sequences shared through quantum mechanical channels.
Record Nr. UNISA-996466084503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui