000 04266nam a22006495i 4500
001 978-3-642-15317-4
003 DE-He213
005 20240423125915.0
007 cr nn 008mamaa
008 100910s2010 gw | s |||| 0|eng d
020 _a9783642153174
_9978-3-642-15317-4
024 7 _a10.1007/978-3-642-15317-4
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity and Cryptography for Networks
_h[electronic resource] :
_b7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings /
_cedited by Juan A. Garay, Roberto De Prisco.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aVII, 474 p. 54 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6280
505 0 _aEncryption I -- Time-Specific Encryption -- Public-Key Encryption with Efficient Amortized Updates -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor in Lattice-Based Cryptography -- Cryptanalysis -- Differential Fault Analysis of LEX -- Generalized RC4 Key Collisions and Hash Collisions -- Hash Functions -- On the Indifferentiability of the Grøstl Hash Function -- Side Channel Attacks and Leakage Resilience -- Algorithmic Tamper-Proof Security under Probing Attacks -- Leakage-Resilient Storage -- Encryption II -- Searching Keywords with Wildcards on Encrypted Data -- Threshold Attribute-Based Signcryption -- Cryptographic Protocols I -- Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation -- How to Pair with a Human -- Authentication and Key Agreement -- A New Security Model for Authenticated Key Agreement -- A Security Enhancement and Proof for Authentication and Key Agreement (AKA) -- Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model -- Cryptographic Primitives and Schemes -- Kleptography from Standard Assumptions and Applications -- Provably Secure Convertible Undeniable Signatures with Unambiguity -- History-Free Aggregate Message Authentication Codes -- Lattice-Based Cryptography -- Recursive Lattice Reduction -- Adaptively Secure Identity-Based Identification from Lattices without Random Oracles -- Groups Signatures and Authentication -- The Fiat–Shamir Transform for Group and Ring Signature Schemes -- Get Shorty via Group Signatures without Encryption -- Group Message Authentication -- Cryptographic Protocols II -- Fast Secure Computation of Set Intersection -- Distributed Private-Key Generators for Identity-BasedCryptography -- Anonymity -- Solving Revocation with Efficient Update of Anonymous Credentials.
650 0 _aData protection.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks .
650 0 _aElectronic data processing
_xManagement.
650 0 _aAlgorithms.
650 0 _aComputers and civilization.
650 1 4 _aData and Information Security.
650 2 4 _aCryptology.
650 2 4 _aComputer Communication Networks.
650 2 4 _aIT Operations.
650 2 4 _aAlgorithms.
650 2 4 _aComputers and Society.
700 1 _aGaray, Juan A.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDe Prisco, Roberto.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642153167
776 0 8 _iPrinted edition:
_z9783642153181
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6280
856 4 0 _uhttps://doi.org/10.1007/978-3-642-15317-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c182957
_d182957