Security in communication networks : 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers / Carlo Blundo, Stelvio Cimato (eds.).

Contributor(s): Blundo, Carlo, 1968- | Cimato, StelvioSeries: Lecture notes in computer science, 3352Publisher: Berlin ; New York : Springer, c2005Description: xi, 379 p. : ill. ; 24 cmISBN: 3540243011 (printed on acid-free paper)Other title: SCN 2004Subject(s): Computer networks -- Security measures | Computer security | CryptographyDDC classification: 005.82,SEC Online resources: Publisher description | Click here to access online
Contents:
ECRYPT : the cryptographic research challenges for the next decade (Page-1), Relationships between Diffie-Hellman and "index oracles (Page-16), On the security notions for public-key encryption schemes (Page-33), Efficient unconditional oblivious transfer from almost any noisy channel (Page-47), A provably secure short transitive signature scheme from bilinear group pairs (Page-60), Group signatures with separate and distributed authorities (Page-77), Threshold cryptography for mobile ad hoc networks (Page-91), Designated verifier signatures : anonymity and efficient construction from any bilinear map (Page-105), Group signatures : better efficiency and new theoretical aspects (Page-120), Efficient blind signatures without random oracles (Page-), (Page-134), Minimalist cryptography for low-cost RFID tags (Page-149), On the key exposure problem in chameleon hashes (Page-165), Identity-based zero knowledge (Page-180), A robust multisignatures scheme with applications to acknowledgment aggregation (Page-193), Efficient key encapsulation to multiple parties (Page-208), Improved signcryption from q-Diffie-Hellman problems (Page-220), Colored visual cryptography without color darkening (Page-235), On the size of monotone span programs (Page-249), Universally composable DKG with linear number of exponentiations (Page-263), An algebraic approach to NTRU (q = 2[superscript n]) via Witt vectors and overdetermined systems of nonlinear equations (Page-278), Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC (Page-294), The decimated sample based improved algebraic attacks on the nonlinear filters (Page-310), Non-randomness of the full 4 and 5-pass HAVAL (Page-324), Controlling spam by secure Internet content selection (Page-337), On session identifiers in provably secure protocols : the Bellare-Rogaway three-party key distribution protocol revisited (Page-351), How to embed short cycles into large nonlinear feedback-shift registers (Page-367).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.82,SEC (Browse shelf) Link to resource Available Almirah No.9, Shelf No.5 MCS32744
Total holds: 0

ECRYPT : the cryptographic research challenges for the next decade (Page-1), Relationships between Diffie-Hellman and "index oracles (Page-16), On the security notions for public-key encryption schemes (Page-33), Efficient unconditional oblivious transfer from almost any noisy channel (Page-47), A provably secure short transitive signature scheme from bilinear group pairs (Page-60), Group signatures with separate and distributed authorities (Page-77), Threshold cryptography for mobile ad hoc networks (Page-91), Designated verifier signatures : anonymity and efficient construction from any bilinear map (Page-105), Group signatures : better efficiency and new theoretical aspects (Page-120), Efficient blind signatures without random oracles (Page-), (Page-134), Minimalist cryptography for low-cost RFID tags (Page-149), On the key exposure problem in chameleon hashes (Page-165), Identity-based zero knowledge (Page-180), A robust multisignatures scheme with applications to acknowledgment aggregation (Page-193), Efficient key encapsulation to multiple parties (Page-208), Improved signcryption from q-Diffie-Hellman problems (Page-220), Colored visual cryptography without color darkening (Page-235), On the size of monotone span programs (Page-249), Universally composable DKG with linear number of exponentiations (Page-263), An algebraic approach to NTRU (q = 2[superscript n]) via Witt vectors and overdetermined systems of nonlinear equations (Page-278), Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC (Page-294), The decimated sample based improved algebraic attacks on the nonlinear filters (Page-310), Non-randomness of the full 4 and 5-pass HAVAL (Page-324), Controlling spam by secure Internet content selection (Page-337), On session identifiers in provably secure protocols : the Bellare-Rogaway three-party key distribution protocol revisited (Page-351), How to embed short cycles into large nonlinear feedback-shift registers (Page-367).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.