top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology – EUROCRYPT 2001 [[electronic resource] ] : International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001, Proceedings / / edited by Birgit Pfitzmann
Advances in Cryptology – EUROCRYPT 2001 [[electronic resource] ] : International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001, Proceedings / / edited by Birgit Pfitzmann
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XIII, 544 p. 23 illus.)
Disciplina 652.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Management information systems
Computer science
Computer communication systems
Algorithms
Computer mathematics
Cryptology
Mathematics of Computing
Management of Computing and Information Systems
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Computational Mathematics and Numerical Analysis
ISBN 3-540-44987-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Elliptic Curves -- A Memory Efficient Version of Satoh’s Algorithm -- Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy -- How Secure Are Elliptic Curves over Composite Extension Fields? -- Commitments -- Efficient and Non-interactive Non-malleable Commitment -- How to Convert the Flavor of a Quantum Bit Commitment -- Anonymity -- Cryptographic Counters and Applications to Electronic Voting -- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation -- Priced Oblivious Transfer: How to Sell Digital Goods -- Signatures and Hash Functions -- A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures -- Practical Threshold RSA Signatures without a Trusted Dealer -- Hash Functions: From Merkle-Damgård to Shoup -- XTR and NTRU -- Key Recovery and Message Attacks on NTRU-Composite -- Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems -- NSS: An NTRU Lattice-Based Signature Scheme -- Assumptions -- The Bit Security of Paillier’s Encryption Scheme and Its Applications -- Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference -- Multiparty Protocols -- On Adaptive vs. Non-adaptive Security of Multiparty Protocols -- Multiparty Computation from Threshold Homomorphic Encryption -- On Perfect and Adaptive Security in Exposure-Resilient Cryptography -- Block Ciphers -- Cryptanalysis of Reduced-Round MISTY -- The Rectangle Attack — Rectangling the Serpent -- Primitives -- Efficient Amplification of the Security of Weak Pseudo-random Function Generators -- Min-round Resettable Zero-Knowledge in the Public-Key Model -- Symmetric Ciphers -- Structural Cryptanalysis of SASAS -- Hyper-bent Functions -- New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs -- Key Exchange and Multicast -- Lower Bounds for Multicast Message Authentication -- Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels -- Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords -- Authentication and Identification -- Identification Protocols Secure against Reset Attacks -- Does Encryption with Redundancy Provide Authenticity? -- Encryption Modes with Almost Free Message Integrity.
Record Nr. UNISA-996466163203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2001 : International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001, Proceedings / / edited by Birgit Pfitzmann
Advances in Cryptology – EUROCRYPT 2001 : International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001, Proceedings / / edited by Birgit Pfitzmann
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XIII, 544 p. 23 illus.)
Disciplina 652.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Management information systems
Computer science
Computer networks
Algorithms
Computer science - Mathematics
Cryptology
Mathematics of Computing
Management of Computing and Information Systems
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Computational Mathematics and Numerical Analysis
ISBN 3-540-44987-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Elliptic Curves -- A Memory Efficient Version of Satoh’s Algorithm -- Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy -- How Secure Are Elliptic Curves over Composite Extension Fields? -- Commitments -- Efficient and Non-interactive Non-malleable Commitment -- How to Convert the Flavor of a Quantum Bit Commitment -- Anonymity -- Cryptographic Counters and Applications to Electronic Voting -- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation -- Priced Oblivious Transfer: How to Sell Digital Goods -- Signatures and Hash Functions -- A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures -- Practical Threshold RSA Signatures without a Trusted Dealer -- Hash Functions: From Merkle-Damgård to Shoup -- XTR and NTRU -- Key Recovery and Message Attacks on NTRU-Composite -- Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems -- NSS: An NTRU Lattice-Based Signature Scheme -- Assumptions -- The Bit Security of Paillier’s Encryption Scheme and Its Applications -- Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference -- Multiparty Protocols -- On Adaptive vs. Non-adaptive Security of Multiparty Protocols -- Multiparty Computation from Threshold Homomorphic Encryption -- On Perfect and Adaptive Security in Exposure-Resilient Cryptography -- Block Ciphers -- Cryptanalysis of Reduced-Round MISTY -- The Rectangle Attack — Rectangling the Serpent -- Primitives -- Efficient Amplification of the Security of Weak Pseudo-random Function Generators -- Min-round Resettable Zero-Knowledge in the Public-Key Model -- Symmetric Ciphers -- Structural Cryptanalysis of SASAS -- Hyper-bent Functions -- New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs -- Key Exchange and Multicast -- Lower Bounds for Multicast Message Authentication -- Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels -- Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords -- Authentication and Identification -- Identification Protocols Secure against Reset Attacks -- Does Encryption with Redundancy Provide Authenticity? -- Encryption Modes with Almost Free Message Integrity.
Record Nr. UNINA-9910143605503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CCS 2004 : proceedings of the 11th ACM Conference on Computer and Communications Security : Washington, DC, USA, October 25-29, 2004
CCS 2004 : proceedings of the 11th ACM Conference on Computer and Communications Security : Washington, DC, USA, October 25-29, 2004
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2004
Descrizione fisica 1 online resource (366 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Computer and Communications Security 2004 : proceedings of the 11th Association for Computing Machinery Conference on Computer and Communications Security : Washington, District of Columbia, United States of America, October 25-29, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security
CCS '04 11th ACM Conference on Computer and Communications Security 2004, Washington, District of Columbia, United States of America - October 25 - 29, 2004
Record Nr. UNINA-9910375914403321
[Place of publication not identified], : ACM, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
SEMPER - Secure Electronic Marketplace for Europe [[electronic resource] /] / edited by Gerard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner
SEMPER - Secure Electronic Marketplace for Europe [[electronic resource] /] / edited by Gerard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (XVIII, 342 p.)
Disciplina 658.8/0025/58
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Information technology
Business—Data processing
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
IT in Business
ISBN 3-540-44927-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Vision of SEMPER -- I. The Vision of SEMPER -- Secure Electronic Commerce -- Technical Framework -- Legal Framework -- Vision of Future Products -- II. Project Achievements -- Project Achievements -- 5: Organizational Overview -- Architecture -- Experiments -- The Fair Internet Trader -- The Commerce Layer: A Framework for Commercial Transactions -- Fair Exchange: A New Paradigm for Electronic Commerce -- 11: The Payment Framework -- 12: Trust Management in the Certificate Block -- 13: Limiting Liability in Electronic Commerce -- 14: Legal Aspects -- Future Directions in Secure Electronic Commerce.
Record Nr. UNISA-996465557803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
SEMPER - Secure Electronic Marketplace for Europe / / edited by Gerard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner
SEMPER - Secure Electronic Marketplace for Europe / / edited by Gerard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (XVIII, 342 p.)
Disciplina 658.8/0025/58
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer networks
Management information systems
Computer science
Information technology
Business—Data processing
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
IT in Business
ISBN 3-540-44927-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Vision of SEMPER -- I. The Vision of SEMPER -- Secure Electronic Commerce -- Technical Framework -- Legal Framework -- Vision of Future Products -- II. Project Achievements -- Project Achievements -- 5: Organizational Overview -- Architecture -- Experiments -- The Fair Internet Trader -- The Commerce Layer: A Framework for Commercial Transactions -- Fair Exchange: A New Paradigm for Electronic Commerce -- 11: The Payment Framework -- 12: Trust Management in the Certificate Block -- 13: Limiting Liability in Electronic Commerce -- 14: Legal Aspects -- Future Directions in Secure Electronic Commerce.
Record Nr. UNINA-9910767551203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui