My Account Log in

1 option

Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / edited by Jonathan Katz, Moti Yung.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Katz, Jonathan, 1974- editor.
Yung, Moti, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 4521.
Security and Cryptology ; 4521
Language:
English
Subjects (All):
Computer networks.
Data encryption (Computer science).
Computer security.
Application software.
Computers and civilization.
Management information systems.
Computer science.
Computer Communication Networks.
Cryptology.
Systems and Data Security.
Information Systems Applications (incl. Internet).
Computers and Society.
Management of Computing and Information Systems.
Local Subjects:
Computer Communication Networks.
Cryptology.
Systems and Data Security.
Information Systems Applications (incl. Internet).
Computers and Society.
Management of Computing and Information Systems.
Physical Description:
1 online resource (XIV, 502 pages).
Edition:
First edition 2007.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
System Details:
text file PDF
Contents:
Signature Schemes I
Generic Transformation to Strongly Unforgeable Signatures
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
Merkle Signatures with Virtually Unlimited Signature Capacity
Computer and Network Security
Midpoints Versus Endpoints: From Protocols to Firewalls
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Cryptanalysis
Cryptanalysis of the TRMC-4 Public Key Cryptosystem
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack
A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
Group-Oriented Security
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
Bayesian Methods for Practical Traitor Tracing
Cryptographic Protocols
A New Protocol for Conditional Disclosure of Secrets and Its Applications
An Unconditionally Secure Protocol for Multi-Party Set Intersection
Privacy-Preserving Set Union
Anonymous Authentication
Universal Accumulators with Efficient Nonmembership Proofs
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
Identity-Based Cryptography
Identity-Based Proxy Re-encryption
A More Natural Way to Construct Identity-Based Identification Schemes
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
Certified E-Mail Protocol in the ID-Based Setting
Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks
Efficient Content Authentication in Peer-to-Peer Networks
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains
BAP: Broadcast Authentication Using Cryptographic Puzzles
Efficient Implementation
Compressed XTR
Sliding Window Method for NTRU
Signature Schemes II
Efficient Certificateless Signature Schemes
Security Mediated Certificateless Signatures
Gradually Convertible Undeniable Signatures.
Other Format:
Printed edition:
ISBN:
978-3-540-72738-5
9783540727385
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account