Cargando…

Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers /

The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe"DioceseHall"oftheArchdioceseofAmal?-Cavade' Tirreni and the "Armorial Bearings Hall" of the Archbishop Palace in Amal?, Italy, on September 8-10, 2004. Previous conferences also...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Blundo, Carlo (Editor ), Cimato, Stelvio (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3352
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Talk
  • ECRYPT: The Cryptographic Research Challenges for the Next Decade
  • Reduction of Security/Primitives
  • Relationships Between Diffie-Hellman and "Index Oracles"
  • On the Security Notions for Public-Key Encryption Schemes
  • Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel
  • Signature Schemes
  • A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs
  • Group Signatures with Separate and Distributed Authorities
  • Threshold Cryptography in Mobile Ad Hoc Networks
  • Anonymity and Privacy
  • Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map
  • Group Signatures: Better Efficiency and New Theoretical Aspects
  • Efficient Blind Signatures Without Random Oracles
  • Authentication and Identification
  • Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)
  • On the Key Exposure Problem in Chameleon Hashes
  • Zero Knowledge
  • Identity-Based Zero-Knowledge
  • Public Key Cryptosystems
  • A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation
  • Efficient Key Encapsulation to Multiple Parties
  • Improved Signcryption from q-Diffie-Hellman Problems
  • Distributed Cryptography
  • Colored Visual Cryptography Without Color Darkening
  • On the Size of Monotone Span Programs
  • Universally Composable DKG with Linear Number of Exponentiations
  • Cryptanalysis of Public Key Cryptosystems
  • An Algebraic Approach to NTRU (q = 2 n ) via Witt Vectors and Overdetermined Systems of Nonlinear Equations
  • Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC
  • Cryptanalysis
  • The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters
  • Non-randomness of the Full 4 and 5-Pass HAVAL
  • Email Security
  • Controlling Spam by Secure Internet Content Selection
  • Key Distribution and Feedback Shift Registers
  • On Session Identifiers in Provably Secure Protocols
  • How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers.