Security and Cryptography for Networks
Editat de Roberto De Prisco, Moti Yungen Limba Engleză Paperback – 24 aug 2006
Preț: 325.47 lei
Preț vechi: 406.84 lei
-20% Nou
Puncte Express: 488
Preț estimativ în valută:
57.60€ • 67.17$ • 50.57£
57.60€ • 67.17$ • 50.57£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540380801
ISBN-10: 3540380809
Pagini: 384
Ilustrații: XII, 368 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.58 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540380809
Pagini: 384
Ilustrații: XII, 368 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.58 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Distributed Systems Security: Foundations.- Edge Eavesdropping Games.- Universally Composable Simultaneous Broadcast.- Signature Schemes Variants.- Relations Among Security Notions for Undeniable Signature Schemes.- Concurrent Blind Signatures Without Random Oracles.- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.- Block Ciphers Analysis.- Understanding Two-Round Differentials in AES.- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b.- Anonymity and E-Commerce.- Constant-Size Dynamic k-TAA.- On Secure Orders in the Presence of Faults.- Balancing Accountability and Privacy Using E-Cash (Extended Abstract).- Public Key Encryption and Key Exchange.- About the Security of MTI/C0 and MQV.- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles.- A New Key Exchange Protocol Based on MQV Assuming Public Computations.- Secret Sharing.- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants.- Cheating Immune (2,n)-Threshold Visual Secret Sharing.- Rational Secret Sharing, Revisited.- Symmetric Key Cryptanalysis and Randomness.- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).- Distinguishing Stream Ciphers with Convolutional Filters.- On Statistical Testing of Random Numbers Generators.- Applied Authentication.- Lightweight Email Signatures (Extended Abstract).- Shoehorning Security into the EPC Tag Standard.- Proof-Carrying Proxy Certificates.- Public Key Related Cryptanalysis.- Cryptanalysis of Rainbow.- An Improved LPN Algorithm.- Invited Talk.- Theory and Practice of Multiparty Computation.