Coverart for item
The Resource Security in Communication Networks : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers, edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano, (electronic resource)

Security in Communication Networks : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers, edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano, (electronic resource)

Label
Security in Communication Networks : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers
Title
Security in Communication Networks
Title remainder
Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers
Statement of responsibility
edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Member of
http://bibfra.me/vocab/relation/corporateauthor
O1biPwoywYA
Dewey number
005.8
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • nwu8Ssxu9_M
  • 4qQSDr-8dlU
  • lM5FobyaBgY
Image bit depth
0
Language note
English
LC call number
TK5105.5-5105.9
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2002
http://bibfra.me/vocab/lite/meetingName
SCN 2002
Nature of contents
dictionaries
http://bibfra.me/vocab/lite/organizationName
SCN 2002
http://library.link/vocab/relatedWorkOrContributorName
  • SCN 2002
  • Cimato, Stelvio.
  • Galdi, Clemente.
  • Persiano, Giuseppe.
Series statement
Lecture Notes in Computer Science,
Series volume
2576
http://library.link/vocab/subjectName
  • Computer Communication Networks
  • Data encryption (Computer science)
  • Operating systems (Computers)
  • Computer software
  • Computer science
  • Computers
  • Computer Communication Networks
  • Cryptology
  • Operating Systems
  • Algorithm Analysis and Problem Complexity
  • Computers and Society
  • Legal Aspects of Computing
Label
Security in Communication Networks : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers, edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Invited Talks -- Some Applications of Polynomials for the Design of Cryptographic Protocols -- Secure Multi-party Computation Made Simple -- Forward Security -- Forward Secrecy in Password-Only Key Exchange Protocols -- Weak Forward Security in Mediated RSA -- Foundations of Cryptography -- On the Power of Claw-Free Permutations -- Equivocable and Extractable Commitment Schemes -- An Improved Pseudorandom Generator Based on Hardness of Factoring -- Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions -- Key Management -- Efficient Re-keying Protocols for Multicast Encryption -- On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure -- A Group Key Distribution Scheme with Decentralised User Join -- Cryptanalysis -- On a Resynchronization Weakness in a Class of Combiners with Memory -- On Probability of Success in Linear and Differential Cryptanalysis -- Differential Cryptanalysis of a Reduced-Round SEED -- System Security -- Medical Information Privacy Assurance: Cryptographic and System Aspects -- A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code -- Signature Schemes -- How to Repair ESIGN -- Forward-Secure Signatures with Fast Key Update -- Constructing Elliptic Curves with Prescribed Embedding Degrees -- A Signature Scheme with Efficient Protocols -- Zero Knowledge -- Efficient Zero-Knowledge Proofs for Some Practical Graph Problems -- Reduction Zero-Knowledge -- A New Notion of Soundness in Bare Public-Key Model -- Information Theory and Secret Sharing -- Robust Information-Theoretic Private Information Retrieval -- Trading Players for Efficiency in Unconditional Multiparty Computation -- Secret Sharing Schemes on Access Structures with Intersection Number Equal to One
Dimensions
unknown
Edition
1st ed. 2003.
Extent
1 online resource (IX, 263 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540364139
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/3-540-36413-7
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000211911
  • (SSID)ssj0000326462
  • (PQKBManifestationID)11297540
  • (PQKBTitleCode)TC0000326462
  • (PQKBWorkID)10297554
  • (PQKB)11629265
  • (DE-He213)978-3-540-36413-9
  • (MiAaPQ)EBC3071945
  • (EXLCZ)991000000000211911
Label
Security in Communication Networks : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers, edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Invited Talks -- Some Applications of Polynomials for the Design of Cryptographic Protocols -- Secure Multi-party Computation Made Simple -- Forward Security -- Forward Secrecy in Password-Only Key Exchange Protocols -- Weak Forward Security in Mediated RSA -- Foundations of Cryptography -- On the Power of Claw-Free Permutations -- Equivocable and Extractable Commitment Schemes -- An Improved Pseudorandom Generator Based on Hardness of Factoring -- Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions -- Key Management -- Efficient Re-keying Protocols for Multicast Encryption -- On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure -- A Group Key Distribution Scheme with Decentralised User Join -- Cryptanalysis -- On a Resynchronization Weakness in a Class of Combiners with Memory -- On Probability of Success in Linear and Differential Cryptanalysis -- Differential Cryptanalysis of a Reduced-Round SEED -- System Security -- Medical Information Privacy Assurance: Cryptographic and System Aspects -- A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code -- Signature Schemes -- How to Repair ESIGN -- Forward-Secure Signatures with Fast Key Update -- Constructing Elliptic Curves with Prescribed Embedding Degrees -- A Signature Scheme with Efficient Protocols -- Zero Knowledge -- Efficient Zero-Knowledge Proofs for Some Practical Graph Problems -- Reduction Zero-Knowledge -- A New Notion of Soundness in Bare Public-Key Model -- Information Theory and Secret Sharing -- Robust Information-Theoretic Private Information Retrieval -- Trading Players for Efficiency in Unconditional Multiparty Computation -- Secret Sharing Schemes on Access Structures with Intersection Number Equal to One
Dimensions
unknown
Edition
1st ed. 2003.
Extent
1 online resource (IX, 263 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540364139
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/3-540-36413-7
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000211911
  • (SSID)ssj0000326462
  • (PQKBManifestationID)11297540
  • (PQKBTitleCode)TC0000326462
  • (PQKBWorkID)10297554
  • (PQKB)11629265
  • (DE-He213)978-3-540-36413-9
  • (MiAaPQ)EBC3071945
  • (EXLCZ)991000000000211911

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...