Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
| Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung |
| Edizione | [1st ed. 2002.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
| Descrizione fisica | 1 online resource (XIV, 630 p.) |
| Disciplina | 005.8/2 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection Computer science—Mathematics Discrete mathematics Algorithms Operating systems (Computers) Electronic data processing—Management Cryptology Data and Information Security Discrete Mathematics in Computer Science Operating Systems IT Operations |
| ISBN | 3-540-45708-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Block Ciphers -- Essential Algebraic Structure within the AES -- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC -- Tweakable Block Ciphers -- Multi-user Oriented Cryptosystems -- The LSD Broadcast Encryption Scheme -- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials -- Foundations and Methodology -- Provably Secure Steganography -- Flaws in Applying Proof Methodologies to Signature Schemes -- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case -- Security of Practical Protocols -- On the Security of RSA Encryption in TLS -- Security Analysis of IKE’s Signature-Based Key-Exchange Protocol -- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks -- Secure Multiparty Computation -- On 2-Round Secure Multiparty Computation -- Private Computation — k-Connected versus 1-Connected Networks -- Public-Key Encryption -- Analysis and Improvements of NTRU Encryption Paddings -- Universal Padding Schemes for RSA -- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent -- Information Theory and Secret Sharing -- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors -- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups -- Cipher Design and Analysis -- A Generalized Birthday Problem -- (Not So) Random Shuffles of RC4 -- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV -- Elliptic Curves and Abelian Varieties -- Supersingular Abelian Varieties in Cryptology -- Efficient Algorithms for Pairing-Based Cryptosystems -- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 -- Password-Based Authentication -- Threshold Password-Authenticated Key Exchange -- Distributed Cryptosystems -- A Threshold Pseudorandom Function Construction and Its Applications -- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products -- Pseudorandomness and Applications -- Hidden Number Problem with the Trace and Bit Security of XTR and LUC -- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security -- Variations on Signatures and Authentication -- Threshold Ring Signatures and Applications to Ad-hoc Groups -- Deniable Ring Authentication -- SiBIR: Signer-Base Intrusion-Resilient Signatures -- Stream Ciphers and Boolean Functions -- Cryptanalysis of Stream Ciphers with Linear Masking -- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers -- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction -- Commitment Schemes -- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks -- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor -- Signature Schemes -- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation -- Security Proof for Partial-Domain Hash Signature Schemes. |
| Record Nr. | UNISA-996465560903316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in Cryptology - CRYPTO 2002 : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung
| Advances in Cryptology - CRYPTO 2002 : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung |
| Edizione | [1st ed. 2002.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
| Descrizione fisica | 1 online resource (XIV, 630 p.) |
| Disciplina | 005.8/2 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection Computer science—Mathematics Discrete mathematics Algorithms Operating systems (Computers) Electronic data processing—Management Cryptology Data and Information Security Discrete Mathematics in Computer Science Operating Systems IT Operations |
| ISBN | 3-540-45708-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Block Ciphers -- Essential Algebraic Structure within the AES -- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC -- Tweakable Block Ciphers -- Multi-user Oriented Cryptosystems -- The LSD Broadcast Encryption Scheme -- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials -- Foundations and Methodology -- Provably Secure Steganography -- Flaws in Applying Proof Methodologies to Signature Schemes -- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case -- Security of Practical Protocols -- On the Security of RSA Encryption in TLS -- Security Analysis of IKE’s Signature-Based Key-Exchange Protocol -- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks -- Secure Multiparty Computation -- On 2-Round Secure Multiparty Computation -- Private Computation — k-Connected versus 1-Connected Networks -- Public-Key Encryption -- Analysis and Improvements of NTRU Encryption Paddings -- Universal Padding Schemes for RSA -- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent -- Information Theory and Secret Sharing -- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors -- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups -- Cipher Design and Analysis -- A Generalized Birthday Problem -- (Not So) Random Shuffles of RC4 -- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV -- Elliptic Curves and Abelian Varieties -- Supersingular Abelian Varieties in Cryptology -- Efficient Algorithms for Pairing-Based Cryptosystems -- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 -- Password-Based Authentication -- Threshold Password-Authenticated Key Exchange -- Distributed Cryptosystems -- A Threshold Pseudorandom Function Construction and Its Applications -- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products -- Pseudorandomness and Applications -- Hidden Number Problem with the Trace and Bit Security of XTR and LUC -- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security -- Variations on Signatures and Authentication -- Threshold Ring Signatures and Applications to Ad-hoc Groups -- Deniable Ring Authentication -- SiBIR: Signer-Base Intrusion-Resilient Signatures -- Stream Ciphers and Boolean Functions -- Cryptanalysis of Stream Ciphers with Linear Masking -- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers -- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction -- Commitment Schemes -- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks -- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor -- Signature Schemes -- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation -- Security Proof for Partial-Domain Hash Signature Schemes. |
| Record Nr. | UNINA-9910143895303321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied Cryptography and Network Security [[electronic resource] ] : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung
| Applied Cryptography and Network Security [[electronic resource] ] : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XIII, 614 p. 704 illus., 57 illus. in color.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computer organization Computers Data structures (Computer science) Software engineering Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Data Structures and Information Theory Information Systems and Communication Service Software Engineering/Programming and Operating Systems |
| ISBN | 3-030-21568-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Integrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security -- Blockchain and Cryptocurrency -- Post Quantum Cryptography -- Public Key and Commitment -- Theory of Cryptographic Implementations -- Privacy Preserving Techniques. |
| Record Nr. | UNISA-996466329503316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Applied Cryptography and Network Security : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung
| Applied Cryptography and Network Security : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XIII, 614 p. 704 illus., 57 illus. in color.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computer organization Computers Data structures (Computer science) Software engineering Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Data Structures and Information Theory Information Systems and Communication Service Software Engineering/Programming and Operating Systems |
| ISBN | 3-030-21568-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Integrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security -- Blockchain and Cryptocurrency -- Post Quantum Cryptography -- Public Key and Commitment -- Theory of Cryptographic Implementations -- Privacy Preserving Techniques. |
| Record Nr. | UNINA-9910337853103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied Cryptography and Network Security [[electronic resource] ] : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / / edited by Jianying Zhou, Moti Yung
| Applied Cryptography and Network Security [[electronic resource] ] : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / / edited by Jianying Zhou, Moti Yung |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
| Descrizione fisica | 1 online resource (XIII, 564 p. 83 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Computer science—Mathematics Discrete mathematics Electronic data processing—Management Algorithms Data protection Computer Communication Networks Cryptology Discrete Mathematics in Computer Science IT Operations Data and Information Security |
| ISBN |
1-280-38725-4
9786613565174 3-642-13708-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption -- How to Construct Interval Encryption from Binary Tree Encryption -- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy -- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs -- Redactable Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail Statistical Saturation Attacks -- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G??? -- High Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks -- Secure Multiplicative Masking of Power Functions -- Zero Knowledge and Multi-party Protocols -- Batch Groth–Sahai -- Efficient and Secure Evaluation of Multivariate Polynomials and Applications -- Efficient Implementation of the Orlandi Protocol -- Improving the Round Complexity of Traitor Tracing Schemes -- Key Management -- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters -- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead -- Deniable Internet Key Exchange -- Authentication and Identification -- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm -- Secure Sketch for Multiple Secrets -- A Message Recognition Protocol Based on Standard Assumptions -- Privacy and Anonymity -- Affiliation-Hiding Key Exchange with Untrusted Group Authorities -- Privacy-Preserving Group Discovery with Linear Complexity -- Two New Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy -- Revisiting Unpredictability-Based RFID Privacy Models -- On RFID Privacy with Mutual Authentication and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures -- COP: A Step toward Children Online Privacy -- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. |
| Record Nr. | UNISA-996465668703316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Applied cryptography and network security : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings / / Jianying Zhou, Moti Yung (eds.)
| Applied cryptography and network security : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings / / Jianying Zhou, Moti Yung (eds.) |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | New York, : Springer, 2010 |
| Descrizione fisica | 1 online resource (XIII, 564 p. 83 illus.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ZhouJianying
YungMoti |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
| Soggetto topico |
Telecommunication - Security measures
Data encryption (Computer science) Cryptography |
| ISBN |
1-280-38725-4
9786613565174 3-642-13708-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption -- How to Construct Interval Encryption from Binary Tree Encryption -- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy -- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs -- Redactable Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail Statistical Saturation Attacks -- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G??? -- High Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks -- Secure Multiplicative Masking of Power Functions -- Zero Knowledge and Multi-party Protocols -- Batch Groth–Sahai -- Efficient and Secure Evaluation of Multivariate Polynomials and Applications -- Efficient Implementation of the Orlandi Protocol -- Improving the Round Complexity of Traitor Tracing Schemes -- Key Management -- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters -- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead -- Deniable Internet Key Exchange -- Authentication and Identification -- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm -- Secure Sketch for Multiple Secrets -- A Message Recognition Protocol Based on Standard Assumptions -- Privacy and Anonymity -- Affiliation-Hiding Key Exchange with Untrusted Group Authorities -- Privacy-Preserving Group Discovery with Linear Complexity -- Two New Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy -- Revisiting Unpredictability-Based RFID Privacy Models -- On RFID Privacy with Mutual Authentication and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures -- COP: A Step toward Children Online Privacy -- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. |
| Record Nr. | UNINA-9910483910603321 |
| New York, : Springer, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied Cryptography and Network Security [[electronic resource] ] : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings / / edited by Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung
| Applied Cryptography and Network Security [[electronic resource] ] : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings / / edited by Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
| Descrizione fisica | 1 online resource (XI, 508 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Data protection Application software Computers and civilization Electronic data processing—Management Computer Communication Networks Cryptology Data and Information Security Computer and Information Systems Applications Computers and Society IT Operations |
| ISBN | 3-540-68914-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | On the Effectiveness of Internal Patching Against File-Sharing Worms -- Peeking Through the Cloud: DNS-Based Estimation and Its Applications -- Pushback for Overlay Networks: Protecting Against Malicious Insiders -- PPAA: Peer-to-Peer Anonymous Authentication -- Generic Constructions of Stateful Public Key Encryption and Their Applications -- Traceable and Retrievable Identity-Based Encryption -- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures -- Attacking Reduced Round SHA-256 -- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography -- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? -- Replay Attack in a Fair Exchange Protocol -- Improved Conditional E-Payments -- Anonymity in Transferable E-cash -- Generic Security-Amplifying Methods of Ordinary Digital Signatures -- New Differential-Algebraic Attacks and Reparametrization of Rainbow -- Trapdoor Sanitizable Signatures and Their Application to Content Protection -- Multi-factor Authenticated Key Exchange -- Repelling Detour Attack Against Onions with Re-encryption -- Analysis of EAP-GPSK Authentication Protocol -- Efficient Device Pairing Using “Human-Comparable” Synchronized Audiovisual Patterns -- PUF-HB: A Tamper-Resilient HB Based Authentication Protocol -- An Authentication Scheme Based on the Twisted Conjugacy Problem -- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance -- A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation -- On the Security of the CCM Encryption Mode and of a Slight Variant -- wNAF *, an Efficient Left-to-Right Signed Digit Recoding Algorithm -- A Very Compact “Perfectly Masked” S-Box for AES -- Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks -- Traceable Privacy of Recent Provably-Secure RFID Protocols -- The Security of EPC Gen2 Compliant RFID Protocols. |
| Record Nr. | UNISA-996465617203316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Applied Cryptography and Network Security [[electronic resource] ] : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / / edited by Jonathan Katz, Moti Yung
| Applied Cryptography and Network Security [[electronic resource] ] : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / / edited by Jonathan Katz, Moti Yung |
| Edizione | [1st ed. 2007.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 |
| Descrizione fisica | 1 online resource (508 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Data protection Application software Computers and civilization Electronic data processing—Management Computer Communication Networks Cryptology Data and Information Security Computer and Information Systems Applications Computers and Society IT Operations |
| ISBN |
1-280-94923-6
9786610949236 3-540-72738-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Signature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure -- Merkle Signatures with Virtually Unlimited Signature Capacity -- Computer and Network Security -- Midpoints Versus Endpoints: From Protocols to Firewalls -- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme -- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus -- Cryptanalysis -- Cryptanalysis of the TRMC-4 Public Key Cryptosystem -- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack -- A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA -- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity -- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications -- An Unconditionally Secure Protocol for Multi-Party Set Intersection -- Privacy-Preserving Set Union -- Anonymous Authentication -- Universal Accumulators with Efficient Nonmembership Proofs -- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes -- Identity-Based Cryptography -- Identity-Based Proxy Re-encryption -- A More Natural Way to Construct Identity-Based Identification Schemes -- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions -- Certified E-Mail Protocol in the ID-Based Setting -- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks -- Efficient Content Authentication in Peer-to-Peer Networks -- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks -- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains -- BAP: Broadcast Authentication Using Cryptographic Puzzles -- Efficient Implementation -- Compressed XTR -- Sliding Window Method for NTRU -- Signature Schemes II -- Efficient Certificateless Signature Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures. |
| Record Nr. | UNISA-996466369503316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / / edited by Jonathan Katz, Moti Yung
| Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / / edited by Jonathan Katz, Moti Yung |
| Edizione | [1st ed. 2007.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 |
| Descrizione fisica | 1 online resource (508 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Data protection Application software Computers and civilization Electronic data processing—Management Computer Communication Networks Cryptology Data and Information Security Computer and Information Systems Applications Computers and Society IT Operations |
| ISBN |
1-280-94923-6
9786610949236 3-540-72738-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Signature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure -- Merkle Signatures with Virtually Unlimited Signature Capacity -- Computer and Network Security -- Midpoints Versus Endpoints: From Protocols to Firewalls -- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme -- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus -- Cryptanalysis -- Cryptanalysis of the TRMC-4 Public Key Cryptosystem -- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack -- A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA -- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity -- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications -- An Unconditionally Secure Protocol for Multi-Party Set Intersection -- Privacy-Preserving Set Union -- Anonymous Authentication -- Universal Accumulators with Efficient Nonmembership Proofs -- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes -- Identity-Based Cryptography -- Identity-Based Proxy Re-encryption -- A More Natural Way to Construct Identity-Based Identification Schemes -- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions -- Certified E-Mail Protocol in the ID-Based Setting -- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks -- Efficient Content Authentication in Peer-to-Peer Networks -- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks -- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains -- BAP: Broadcast Authentication Using Cryptographic Puzzles -- Efficient Implementation -- Compressed XTR -- Sliding Window Method for NTRU -- Signature Schemes II -- Efficient Certificateless Signature Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures. |
| Record Nr. | UNINA-9910483047003321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied Cryptography and Network Security [[electronic resource] ] : 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings / / edited by Jianying Zhou, Moti Yung, Feng Bao
| Applied Cryptography and Network Security [[electronic resource] ] : 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings / / edited by Jianying Zhou, Moti Yung, Feng Bao |
| Edizione | [1st ed. 2006.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
| Descrizione fisica | 1 online resource (XIV, 490 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Operating systems (Computers) Application software Computers and civilization Electronic data processing—Management Computer Communication Networks Cryptology Operating Systems Computer and Information Systems Applications Computers and Society IT Operations |
| ISBN | 3-540-34704-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intrusion Avoidance and Detection -- Adaptive Detection of Local Scanners -- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection -- DSO: Dependable Signing Overlay -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy Multi-coupon System -- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families -- DoS: Attacks and Countermeasures -- Efficient Memory Bound Puzzles Using Pattern Databases -- Effect of Malicious Synchronization -- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets -- Key Management -- Password Based Server Aided Key Exchange -- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks -- Stateful Subset Cover -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New Instance of TTM Cryptosystems -- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks -- Physical Security Bounds Against Tampering -- Flexible Exponentiation with Resistance to Side Channel Attacks -- Cryptography -- An Improved Poly1305 MAC -- Certificateless Public-Key Signature: Security Model and Efficient Construction -- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive -- Authentication and Web Security -- Authentication for Paranoids: Multi-party Secret Handshakes -- On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan -- W3Bcrypt: Encryption as a Stylesheet -- Ad Hoc and Sensor Network Security -- Combinatorial Structures for Design of Wireless Sensor Networks -- Public Key Cryptography Sans Certificates in Ad Hoc Networks -- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks -- Cryptographic Constructions -- A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography -- Results on Almost Resilient Functions -- Real Perfect Contrast Visual Secret Sharing Schemes with Reversing -- Security and Privacy -- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries -- Improving the Randomized Initial Point Countermeasure Against DPA -- Syntax-Driven Private Evaluation of Quantified Membership Queries. |
| Record Nr. | UNISA-996465520103316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||