Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings /
The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Italy, on September 6-8, 2006. The conference was the ?fth in the SCN series, and this year marked a change in its name (the former name was Security in Communication Networks). The name change meant to bett...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
4116 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Distributed Systems Security: Foundations
- Edge Eavesdropping Games
- Universally Composable Simultaneous Broadcast
- Signature Schemes Variants
- Relations Among Security Notions for Undeniable Signature Schemes
- Concurrent Blind Signatures Without Random Oracles
- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions
- Block Ciphers Analysis
- Understanding Two-Round Differentials in AES
- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b
- Anonymity and E-Commerce
- Constant-Size Dynamic k-TAA
- On Secure Orders in the Presence of Faults
- Balancing Accountability and Privacy Using E-Cash (Extended Abstract)
- Public Key Encryption and Key Exchange
- About the Security of MTI/C0 and MQV
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
- A New Key Exchange Protocol Based on MQV Assuming Public Computations
- Secret Sharing
- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants
- Cheating Immune (2,n)-Threshold Visual Secret Sharing
- Rational Secret Sharing, Revisited
- Symmetric Key Cryptanalysis and Randomness
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Distinguishing Stream Ciphers with Convolutional Filters
- On Statistical Testing of Random Numbers Generators
- Applied Authentication
- Lightweight Email Signatures (Extended Abstract)
- Shoehorning Security into the EPC Tag Standard
- Proof-Carrying Proxy Certificates
- Public Key Related Cryptanalysis
- Cryptanalysis of Rainbow
- An Improved LPN Algorithm
- Invited Talk
- Theory and Practice of Multiparty Computation.