000 04717nam a22006255i 4500
001 978-3-540-72738-5
003 DE-He213
005 20240730203013.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540727385
_9978-3-540-72738-5
024 7 _a10.1007/978-3-540-72738-5
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aApplied Cryptography and Network Security
_h[electronic resource] :
_b5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings /
_cedited by Jonathan Katz, Moti Yung.
250 _a1st ed. 2007.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2007.
300 _aXIV, 502 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4521
505 0 _aSignature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure -- Merkle Signatures with Virtually Unlimited Signature Capacity -- Computer and Network Security -- Midpoints Versus Endpoints: From Protocols to Firewalls -- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme -- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus -- Cryptanalysis -- Cryptanalysis of the TRMC-4 Public Key Cryptosystem -- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack -- A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA -- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity -- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications -- An Unconditionally Secure Protocol for Multi-Party Set Intersection -- Privacy-Preserving Set Union -- Anonymous Authentication -- Universal Accumulators with Efficient Nonmembership Proofs -- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes -- Identity-Based Cryptography -- Identity-Based Proxy Re-encryption -- A More Natural Way to Construct Identity-Based Identification Schemes -- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions -- Certified E-Mail Protocol in the ID-Based Setting -- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks -- Efficient Content Authentication in Peer-to-Peer Networks -- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks -- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains -- BAP: Broadcast Authentication Using Cryptographic Puzzles -- Efficient Implementation -- Compressed XTR -- Sliding Window Method for NTRU -- Signature Schemes II -- Efficient Certificateless Signature Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures.
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData protection.
_97245
650 0 _aApplication software.
_9174041
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9174042
650 1 4 _aComputer Communication Networks.
_9174043
650 2 4 _aCryptology.
_931769
650 2 4 _aData and Information Security.
_931990
650 2 4 _aComputer and Information Systems Applications.
_9174044
650 2 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
700 1 _aKatz, Jonathan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9174045
700 1 _aYung, Moti.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9174046
710 2 _aSpringerLink (Online service)
_9174047
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540727378
776 0 8 _iPrinted edition:
_z9783540838814
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4521
_9174048
856 4 0 _uhttps://doi.org/10.1007/978-3-540-72738-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c97291
_d97291