top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / / J. Seberry, J. Pieprzyk, eds
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / / J. Seberry, J. Pieprzyk, eds
Pubbl/distr/stampa Springer Berlin Heidelberg
Disciplina 005.8/2
Altri autori (Persone) SeberryJennifer
PieprzykJosef
Soggetto topico Computer security - Congresses
Cryptography - Congresses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465865003316
Springer Berlin Heidelberg
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings / / Jennifer Seberry, Yuliang Zheng, eds
Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings / / Jennifer Seberry, Yuliang Zheng, eds
Pubbl/distr/stampa Springer Berlin Heidelberg
Disciplina 005.8/2
Altri autori (Persone) SeberryJennifer
ZhengYuliang
Soggetto topico Computer security - Congresses
Cryptography - Congresses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Advances in Cryptology — AUSCRYPT '92
Record Nr. UNISA-996465877203316
Springer Berlin Heidelberg
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Information Security [[electronic resource] ] : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (X, 322 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Operating systems (Computers)
Management information systems
Computer science
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Operating Systems
Management of Computing and Information Systems
ISBN 3-540-44456-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Copyright Protection -- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling -- Region-Based Watermarking by Distribution Adjustment -- Hiding Information in Color Images Using Small Color Palettes -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software -- Characteristics of Some Binary Codes for Fingerprinting -- E-Commerce -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees -- Unlinkable Divisible Electronic Cash -- Weighted One-Way Hash Chain and Its Applications -- Linkability in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key Management -- Probabilistic Methods in Multicast Key Management -- Classification of Authentication Protocols: A Practical Approach -- Exploring Fair Exchange Protocols Using Specification Animation -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation -- Network Security and Access Control -- An Efficient Protocol for Certified Electronic Mail -- Performance Analysis of Secure Web Server Based on SSL -- Sherlock: Commercial High Assurance Network Computing Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic Systems -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization -- A Signcryption Scheme Based on Integer Factorization.
Record Nr. UNINA-9910143608103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Information Security [[electronic resource] ] : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (X, 322 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Operating systems (Computers)
Management information systems
Computer science
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Operating Systems
Management of Computing and Information Systems
ISBN 3-540-44456-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Copyright Protection -- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling -- Region-Based Watermarking by Distribution Adjustment -- Hiding Information in Color Images Using Small Color Palettes -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software -- Characteristics of Some Binary Codes for Fingerprinting -- E-Commerce -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees -- Unlinkable Divisible Electronic Cash -- Weighted One-Way Hash Chain and Its Applications -- Linkability in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key Management -- Probabilistic Methods in Multicast Key Management -- Classification of Authentication Protocols: A Practical Approach -- Exploring Fair Exchange Protocols Using Specification Animation -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation -- Network Security and Access Control -- An Efficient Protocol for Certified Electronic Mail -- Performance Analysis of Secure Web Server Based on SSL -- Sherlock: Commercial High Assurance Network Computing Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic Systems -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization -- A Signcryption Scheme Based on Integer Factorization.
Record Nr. UNISA-996466008803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings / / edited by Willy Susilo, Yi Mu, Jennifer Seberry
Information Security and Privacy [[electronic resource] ] : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings / / edited by Willy Susilo, Yi Mu, Jennifer Seberry
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIV, 460 p. 46 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Coding theory
Information theory
Application software
E-commerce
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Coding and Information Theory
Computer Appl. in Administrative Data Processing
e-Commerce/e-business
ISBN 3-642-31448-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465758903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings / / edited by Yi Mu, Willy Susilo, Jennifer Seberry
Information Security and Privacy [[electronic resource] ] : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings / / edited by Yi Mu, Willy Susilo, Jennifer Seberry
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIII, 480 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computer security
Computer communication systems
Coding theory
Information theory
Algorithms
Cryptology
Management of Computing and Information Systems
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
Algorithm Analysis and Problem Complexity
ISBN 3-540-70500-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto New Paradigms for Password Security -- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy -- Secure Biometric Authentication with Improved Accuracy -- A Critical Analysis and Improvement of AACS Drive-Host Authentication -- Comparing the Pre- and Post-specified Peer Models for Key Agreement -- Efficient One-Round Key Exchange in the Standard Model -- On the Improvement of the BDF Attack on LSBS-RSA -- Public-Key Cryptosystems with Primitive Power Roots of Unity -- Relationship between Two Approaches for Defining the Standard Model PA-ness -- Distributed Verification of Mixing - Local Forking Proofs Model -- Fully-Simulatable Oblivious Set Transfer -- Efficient Disjointness Tests for Private Datasets -- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of Reduced-Round SMS4 Block Cipher -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks against SHA-2 Hash Family -- Collisions for Round-Reduced LAKE -- Preimage Attacks on Step-Reduced MD5 -- Linear Distinguishing Attack on Shannon -- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck -- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 -- Signature Generation and Detection of Malware Families -- Reducing Payload Scans for Attack Signature Matching Using Rule Classification -- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor -- FormatShield: A Binary Rewriting Defense against Format String Attacks -- Advanced Permission-Role Relationship in Role-Based Access Control -- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases -- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ) -- A Tree-Based Approach for Computing Double-Base Chains -- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves -- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.
Record Nr. UNISA-996465735503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings / / edited by Yi Mu, Willy Susilo, Jennifer Seberry
Information Security and Privacy [[electronic resource] ] : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings / / edited by Yi Mu, Willy Susilo, Jennifer Seberry
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIII, 480 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computer security
Computer communication systems
Coding theory
Information theory
Algorithms
Cryptology
Management of Computing and Information Systems
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
Algorithm Analysis and Problem Complexity
ISBN 3-540-70500-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto New Paradigms for Password Security -- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy -- Secure Biometric Authentication with Improved Accuracy -- A Critical Analysis and Improvement of AACS Drive-Host Authentication -- Comparing the Pre- and Post-specified Peer Models for Key Agreement -- Efficient One-Round Key Exchange in the Standard Model -- On the Improvement of the BDF Attack on LSBS-RSA -- Public-Key Cryptosystems with Primitive Power Roots of Unity -- Relationship between Two Approaches for Defining the Standard Model PA-ness -- Distributed Verification of Mixing - Local Forking Proofs Model -- Fully-Simulatable Oblivious Set Transfer -- Efficient Disjointness Tests for Private Datasets -- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of Reduced-Round SMS4 Block Cipher -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks against SHA-2 Hash Family -- Collisions for Round-Reduced LAKE -- Preimage Attacks on Step-Reduced MD5 -- Linear Distinguishing Attack on Shannon -- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck -- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 -- Signature Generation and Detection of Malware Families -- Reducing Payload Scans for Attack Signature Matching Using Rule Classification -- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor -- FormatShield: A Binary Rewriting Defense against Format String Attacks -- Advanced Permission-Role Relationship in Role-Based Access Control -- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases -- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ) -- A Tree-Based Approach for Computing Double-Base Chains -- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves -- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.
Record Nr. UNINA-9910484593003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings / / edited by Rei Safavi-Naini, Jennifer Seberry
Information Security and Privacy [[electronic resource] ] : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings / / edited by Rei Safavi-Naini, Jennifer Seberry
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 540 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Coding theory
Information theory
Algorithms
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-540-45067-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Anonymity -- Grouping Verifiable Content for Selective Disclosure -- Evaluation of Anonymity of Practical Anonymous Communication Networks -- An Anonymous Credential System and a Privacy-Aware PKI -- Flaws in Some Robust Optimistic Mix-Nets -- Invited Talk (I) -- The Unsolvable Privacy Problem and Its Implications for Security Technologies -- Elliptic Curves -- The Security of Fixed versus Random Elliptic Curves in Cryptography -- Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains -- Generic GF(2m) Arithmetic in Software and Its Application to ECC -- An Addition Algorithm in Jacobian of C 34 Curve -- Crytpanalysis (I) -- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces -- Differential Fault Analysis on AES Key Schedule and Some Countermeasures -- On the Pseudorandomness of KASUMI Type Permutations -- Theoretical Analysis of ?2 Attack on RC6 -- Mobile and Network Security -- A Typed Theory for Access Control and Information Flow Control in Mobile Systems -- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach -- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications -- Practical Pay TV Schemes -- Cooperative Routers against DoS Attacks -- Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs -- Malicious ICMP Tunneling: Defense against the Vulnerability -- On Fair E-cash Systems Based on Group Signature Schemes -- Invited Talk (II) -- A Taxonomy of Single Sign-On Systems -- Cryptanalysis (II) -- Key Recovery Attacks on the RMAC, TMAC, and IACBC -- Key Recovery Attacks on NTRU without Ciphertext Validation Routine -- Permanent Fault Attack on the Parameters of RSA with CRT -- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts -- Signature -- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings -- Digital Signature Schemes with Restriction on Signing Capability -- On the Exact Security of Multi-signature Schemes Based on RSA -- Cryptosystems (I) -- A Length-Flexible Threshold Cryptosystem with Applications -- Separating Encryption and Key Issuance in Digital Rights Management Systems -- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers -- Parallel Authentication and Public-Key Encryption -- Invited Talk (III) -- Is Cross-Platform Security Possible? -- Cryptosystems (II) -- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems -- Cryptanalysis of a New Cellular Automata Cryptosystem -- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers -- Clock-Controlled Shrinking Generator of Feedback Shift Registers -- Key Management -- EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange -- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join -- Robust Software Tokens — Yet Another Method for Securing User’s Digital Identity -- Theory and Hash Functions -- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders -- New Constructions for Resilient and Highly Nonlinear Boolean Functions -- On Parallel Hash Functions Based on Block-Cipher -- Square Hash with a Small Key Size.
Record Nr. UNISA-996465900103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings / / edited by Rei Safavi-Naini, Jennifer Seberry
Information Security and Privacy [[electronic resource] ] : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings / / edited by Rei Safavi-Naini, Jennifer Seberry
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 540 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Coding theory
Information theory
Algorithms
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-540-45067-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Anonymity -- Grouping Verifiable Content for Selective Disclosure -- Evaluation of Anonymity of Practical Anonymous Communication Networks -- An Anonymous Credential System and a Privacy-Aware PKI -- Flaws in Some Robust Optimistic Mix-Nets -- Invited Talk (I) -- The Unsolvable Privacy Problem and Its Implications for Security Technologies -- Elliptic Curves -- The Security of Fixed versus Random Elliptic Curves in Cryptography -- Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains -- Generic GF(2m) Arithmetic in Software and Its Application to ECC -- An Addition Algorithm in Jacobian of C 34 Curve -- Crytpanalysis (I) -- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces -- Differential Fault Analysis on AES Key Schedule and Some Countermeasures -- On the Pseudorandomness of KASUMI Type Permutations -- Theoretical Analysis of ?2 Attack on RC6 -- Mobile and Network Security -- A Typed Theory for Access Control and Information Flow Control in Mobile Systems -- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach -- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications -- Practical Pay TV Schemes -- Cooperative Routers against DoS Attacks -- Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs -- Malicious ICMP Tunneling: Defense against the Vulnerability -- On Fair E-cash Systems Based on Group Signature Schemes -- Invited Talk (II) -- A Taxonomy of Single Sign-On Systems -- Cryptanalysis (II) -- Key Recovery Attacks on the RMAC, TMAC, and IACBC -- Key Recovery Attacks on NTRU without Ciphertext Validation Routine -- Permanent Fault Attack on the Parameters of RSA with CRT -- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts -- Signature -- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings -- Digital Signature Schemes with Restriction on Signing Capability -- On the Exact Security of Multi-signature Schemes Based on RSA -- Cryptosystems (I) -- A Length-Flexible Threshold Cryptosystem with Applications -- Separating Encryption and Key Issuance in Digital Rights Management Systems -- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers -- Parallel Authentication and Public-Key Encryption -- Invited Talk (III) -- Is Cross-Platform Security Possible? -- Cryptosystems (II) -- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems -- Cryptanalysis of a New Cellular Automata Cryptosystem -- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers -- Clock-Controlled Shrinking Generator of Feedback Shift Registers -- Key Management -- EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange -- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join -- Robust Software Tokens — Yet Another Method for Securing User’s Digital Identity -- Theory and Hash Functions -- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders -- New Constructions for Resilient and Highly Nonlinear Boolean Functions -- On Parallel Hash Functions Based on Block-Cipher -- Square Hash with a Small Key Size.
Record Nr. UNINA-9910768469703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings / / edited by Lynn Batten, Jennifer Seberry
Information Security and Privacy [[electronic resource] ] : 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings / / edited by Lynn Batten, Jennifer Seberry
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XII, 516 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Operating systems (Computers)
Computer communication systems
Algorithms
Computers and civilization
Cryptology
Management of Computing and Information Systems
Operating Systems
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-540-45450-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key Handling -- A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields -- Security Analysis and Improvement of the Global Key Recovery System -- The LILI-II Keystream Generator -- A Secure Re-keying Scheme with Key Recovery Property -- Trust and Secret Sharing -- Modelling Trust Structures for Public Key Infrastructures -- Size of Broadcast in Threshold Schemes with Disenrollment -- Requirements for Group Independent Linear Threshold Secret Sharing Schemes -- Efficient Sharing of Encrypted Data -- Cheating Prevention in Linear Secret Sharing -- Fast Computation -- Note on Fast Computation of Secret RSA Exponents -- Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying -- Cryptanalysis I -- Cryptanalysis of Stream Cipher COS (2, 128) Mode I -- The Analysis of Zheng-Seberry Scheme -- Cryptanalysis of Stream Cipher Alpha1 -- A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem -- Elliptic Curves -- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over -- Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems -- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis -- AES -- Strengthening the Key Schedule of the AES -- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes -- Security Management -- Security Management: An Information Systems Setting -- Resolving Conflicts in Authorization Delegations -- Policy Administration Domains -- Authentication -- Maintaining the Validity of Digital Signatures in B2B Applications -- Short 3-Secure Fingerprinting Codes for Copyright Protection -- An Order-Specified Multisignature Scheme Secure against Active Insider Attacks -- Authenticated Operation of Open Computing Devices -- A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem -- Invited Talk -- A Brief Outline of Research on Correlation Immune Functions -- Oblivious Transfer -- m out of n Oblivious Transfer -- Cryptanalysis II -- On the Security of Reduced Versions of 3-Pass HAVAL -- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling -- On the Security of a Modified Paillier Public-Key Primitive -- Dealing with Adversaries -- How to Play Sherlock Holmes in the World of Mobile Agents -- A Practical Approach Defeating Blackmailing -- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing -- Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.
Record Nr. UNINA-9910143899503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui