top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings / / Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.)
Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings / / Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 476 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
ISBN 3-540-73458-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks -- Strengthening NLS Against Crossword Puzzle Attack -- Hashing -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT-Hashing Function -- Second Preimages for Iterated Hash Functions and Their Implications on MACs -- On Building Hash Functions from Multivariate Quadratic Equations -- Biometrics -- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication -- Soft Generation of Secure Biometric Keys -- Secret Sharing -- Flaws in Some Secret Sharing Schemes Against Cheating -- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters -- Cryptanalysis -- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 -- Analysis of the SMS4 Block Cipher -- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme -- Public Key Cryptography -- : A Hardware-Oriented Trapdoor Cipher -- Anonymity on Paillier’s Trap-Door Permutation -- Generic Certificateless Key Encapsulation Mechanism -- Double-Size Bipartite Modular Multiplication -- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography -- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM -- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards -- Authentication -- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication -- Certificateless Signature Revisited -- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures -- Hash-and-Sign with Weak Hashing Made Secure -- “Sandwich” Is Indeed Secure: How to Authenticate a Message with Just One Hashing -- Threshold Anonymous Group Identification and Zero-Knowledge Proof -- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions -- E-Commerce -- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users -- Efficient and Secure Comparison for On-Line Auctions -- Practical Compact E-Cash -- Security -- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks -- On Proactive Perfectly Secure Message Transmission.
Record Nr. UNINA-9910484083503321
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings / / Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.)
Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings / / Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 476 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
ISBN 3-540-73458-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks -- Strengthening NLS Against Crossword Puzzle Attack -- Hashing -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT-Hashing Function -- Second Preimages for Iterated Hash Functions and Their Implications on MACs -- On Building Hash Functions from Multivariate Quadratic Equations -- Biometrics -- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication -- Soft Generation of Secure Biometric Keys -- Secret Sharing -- Flaws in Some Secret Sharing Schemes Against Cheating -- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters -- Cryptanalysis -- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 -- Analysis of the SMS4 Block Cipher -- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme -- Public Key Cryptography -- : A Hardware-Oriented Trapdoor Cipher -- Anonymity on Paillier’s Trap-Door Permutation -- Generic Certificateless Key Encapsulation Mechanism -- Double-Size Bipartite Modular Multiplication -- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography -- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM -- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards -- Authentication -- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication -- Certificateless Signature Revisited -- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures -- Hash-and-Sign with Weak Hashing Made Secure -- “Sandwich” Is Indeed Secure: How to Authenticate a Message with Just One Hashing -- Threshold Anonymous Group Identification and Zero-Knowledge Proof -- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions -- E-Commerce -- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users -- Efficient and Secure Comparison for On-Line Auctions -- Practical Compact E-Cash -- Security -- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks -- On Proactive Perfectly Secure Message Transmission.
Record Nr. UNISA-996466255003316
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable security : third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings / / Josef Pieprzyk, Fangguo Zhang (eds.)
Provable security : third international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings / / Josef Pieprzyk, Fangguo Zhang (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2009
Descrizione fisica 1 online resource (XII, 275 p.)
Disciplina 005.8
Altri autori (Persone) PieprzykJosef <1949->
ZhangFangguo
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Cryptography
ISBN 3-642-04642-8
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- A Brief History of Security Models for Confidentiality -- Symbolic Methods for Provable Security -- Encryption -- Efficient Non-interactive Universally Composable String-Commitment Schemes -- Spatial Encryption under Simpler Assumption -- Chosen-Ciphertext Secure RSA-Type Cryptosystems -- Anonymous Conditional Proxy Re-encryption without Random Oracle -- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme -- Digital Signatures -- Identity-Based Verifiably Encrypted Signatures without Random Oracles -- How to Prove Security of a Signature with a Tighter Security Reduction -- Twin Signature Schemes, Revisited -- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions -- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? -- Anonymous Signatures Revisited -- Cryptographic Protocols -- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles -- Password Authenticated Key Exchange Based on RSA in the Three-Party Settings -- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols -- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge -- Server-Controlled Identity-Based Authenticated Key Exchange -- Reductions and Privacy -- Oracle Separation in the Non-uniform Model -- GUC-Secure Set-Intersection Computation -- Self-enforcing Private Inference Control.
Altri titoli varianti ProvSec 2009
Record Nr. UNINA-9910484630103321
Berlin ; ; New York, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui