My Account Log in

1 option

Security in Communication Networks : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers / edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Cimato, Stelvio, editor.
Galdi, Clemente, editor.
Persiano, Giuseppe, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 2576.
Lecture Notes in Computer Science, 0302-9743 ; 2576
Language:
English
Subjects (All):
Computer networks.
Data encryption (Computer science).
Operating systems (Computers).
Algorithms.
Computers and civilization.
Computers.
Law and legislation.
Computer Communication Networks.
Cryptology.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computers and Society.
Legal Aspects of Computing.
Local Subjects:
Computer Communication Networks.
Cryptology.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computers and Society.
Legal Aspects of Computing.
Physical Description:
1 online resource (IX, 263 pages).
Edition:
First edition 2003.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
System Details:
text file PDF
Contents:
Invited Talks
Some Applications of Polynomials for the Design of Cryptographic Protocols
Secure Multi-party Computation Made Simple
Forward Security
Forward Secrecy in Password-Only Key Exchange Protocols
Weak Forward Security in Mediated RSA
Foundations of Cryptography
On the Power of Claw-Free Permutations
Equivocable and Extractable Commitment Schemes
An Improved Pseudorandom Generator Based on Hardness of Factoring
Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions
Key Management
Efficient Re-keying Protocols for Multicast Encryption
On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure
A Group Key Distribution Scheme with Decentralised User Join
Cryptanalysis
On a Resynchronization Weakness in a Class of Combiners with Memory
On Probability of Success in Linear and Differential Cryptanalysis
Differential Cryptanalysis of a Reduced-Round SEED
System Security
Medical Information Privacy Assurance: Cryptographic and System Aspects
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
Signature Schemes
How to Repair ESIGN
Forward-Secure Signatures with Fast Key Update
Constructing Elliptic Curves with Prescribed Embedding Degrees
A Signature Scheme with Efficient Protocols
Zero Knowledge
Efficient Zero-Knowledge Proofs for Some Practical Graph Problems
Reduction Zero-Knowledge
A New Notion of Soundness in Bare Public-Key Model
Information Theory and Secret Sharing
Robust Information-Theoretic Private Information Retrieval
Trading Players for Efficiency in Unconditional Multiparty Computation
Secret Sharing Schemes on Access Structures with Intersection Number Equal to One.
Other Format:
Printed edition:
ISBN:
978-3-540-36413-9
9783540364139
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account