Security in Communication Networks
Editat de Carlo Blundo, Stelvio Cimatoen Limba Engleză Paperback – 2 feb 2005
Preț: 326.07 lei
Preț vechi: 407.59 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
57.70€ • 67.29$ • 50.66£
57.70€ • 67.29$ • 50.66£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540243014
ISBN-10: 3540243011
Pagini: 396
Ilustrații: XII, 388 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.6 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540243011
Pagini: 396
Ilustrații: XII, 388 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.6 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talk.- ECRYPT: The Cryptographic Research Challenges for the Next Decade.- Reduction of Security/Primitives.- Relationships Between Diffie-Hellman and “Index Oracles”.- On the Security Notions for Public-Key Encryption Schemes.- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel.- Signature Schemes.- A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs.- Group Signatures with Separate and Distributed Authorities.- Threshold Cryptography in Mobile Ad Hoc Networks.- Anonymity and Privacy.- Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map.- Group Signatures: Better Efficiency and New Theoretical Aspects.- Efficient Blind Signatures Without Random Oracles.- Authentication and Identification.- Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract).- On the Key Exposure Problem in Chameleon Hashes.- Zero Knowledge.- Identity-Based Zero-Knowledge.- Public Key Cryptosystems.- A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation.- Efficient Key Encapsulation to Multiple Parties.- Improved Signcryption from q-Diffie-Hellman Problems.- Distributed Cryptography.- Colored Visual Cryptography Without Color Darkening.- On the Size of Monotone Span Programs.- Universally Composable DKG with Linear Number of Exponentiations.- Cryptanalysis of Public Key Cryptosystems.- An Algebraic Approach to NTRU (q = 2 n ) via Witt Vectors and Overdetermined Systems of Nonlinear Equations.- Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC.- Cryptanalysis.- The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters.- Non-randomness of the Full 4 and 5-Pass HAVAL.- Email Security.- Controlling Spam by Secure Internet Content Selection.- KeyDistribution and Feedback Shift Registers.- On Session Identifiers in Provably Secure Protocols.- How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers.