TY - GEN AU - Blundo,Carlo AU - Cimato,Stelvio TI - Security in communication networks: 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers / SN - 3540243011 (printed on acid-free paper) U1 - 005.82,SEC PY - 2005/// CY - Berlin, New York PB - Springer KW - Computer networks KW - Security measures KW - Computer security KW - Cryptography N1 - ECRYPT : the cryptographic research challenges for the next decade (Page-1), Relationships between Diffie-Hellman and "index oracles (Page-16), On the security notions for public-key encryption schemes (Page-33), Efficient unconditional oblivious transfer from almost any noisy channel (Page-47), A provably secure short transitive signature scheme from bilinear group pairs (Page-60), Group signatures with separate and distributed authorities (Page-77), Threshold cryptography for mobile ad hoc networks (Page-91), Designated verifier signatures : anonymity and efficient construction from any bilinear map (Page-105), Group signatures : better efficiency and new theoretical aspects (Page-120), Efficient blind signatures without random oracles (Page-), (Page-134), Minimalist cryptography for low-cost RFID tags (Page-149), On the key exposure problem in chameleon hashes (Page-165), Identity-based zero knowledge (Page-180), A robust multisignatures scheme with applications to acknowledgment aggregation (Page-193), Efficient key encapsulation to multiple parties (Page-208), Improved signcryption from q-Diffie-Hellman problems (Page-220), Colored visual cryptography without color darkening (Page-235), On the size of monotone span programs (Page-249), Universally composable DKG with linear number of exponentiations (Page-263), An algebraic approach to NTRU (q = 2[superscript n]) via Witt vectors and overdetermined systems of nonlinear equations (Page-278), Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC (Page-294), The decimated sample based improved algebraic attacks on the nonlinear filters (Page-310), Non-randomness of the full 4 and 5-pass HAVAL (Page-324), Controlling spam by secure Internet content selection (Page-337), On session identifiers in provably secure protocols : the Bellare-Rogaway three-party key distribution protocol revisited (Page-351), How to embed short cycles into large nonlinear feedback-shift registers (Page-367) UR - http://www.loc.gov/catdir/enhancements/fy0663/2004117660-d.html UR - http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3352 ER -