Coverart for item
The Resource Security and Cryptography for Networks : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings, edited by Roberto Prisco, Moti Yung, (electronic resource)

Security and Cryptography for Networks : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings, edited by Roberto Prisco, Moti Yung, (electronic resource)

Label
Security and Cryptography for Networks : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings
Title
Security and Cryptography for Networks
Title remainder
5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings
Statement of responsibility
edited by Roberto Prisco, Moti Yung
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
This book constitutes the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006, held in Maiori, Italy in September 2006. The 24 revised full papers presented together with the abstract of an invited talk were carefully revised and selected from 81 submissions. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and public key related cryptanalisis
Member of
http://library.link/vocab/creatorName
Prisco, Roberto
Image bit depth
0
LC call number
QA76.9.A25
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • Yung, Moti.
  • SpringerLink
Series statement
Lecture Notes in Computer Science,
Series volume
4116
http://library.link/vocab/subjectName
  • Computer science
  • Computer Communication Networks
  • Operating systems (Computers)
  • Data encryption (Computer science)
  • Computer software
  • Information Systems
  • Computer Science
  • Data Encryption
  • Computer Communication Networks
  • Operating Systems
  • Management of Computing and Information Systems
  • Algorithm Analysis and Problem Complexity
  • Computers and Society
Label
Security and Cryptography for Networks : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings, edited by Roberto Prisco, Moti Yung, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Distributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable Simultaneous Broadcast -- Signature Schemes Variants -- Relations Among Security Notions for Undeniable Signature Schemes -- Concurrent Blind Signatures Without Random Oracles -- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions -- Block Ciphers Analysis -- Understanding Two-Round Differentials in AES -- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b -- Anonymity and E-Commerce -- Constant-Size Dynamic k-TAA -- On Secure Orders in the Presence of Faults -- Balancing Accountability and Privacy Using E-Cash (Extended Abstract) -- Public Key Encryption and Key Exchange -- About the Security of MTI/C0 and MQV -- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles -- A New Key Exchange Protocol Based on MQV Assuming Public Computations -- Secret Sharing -- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants -- Cheating Immune (2,n)-Threshold Visual Secret Sharing -- Rational Secret Sharing, Revisited -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) -- Distinguishing Stream Ciphers with Convolutional Filters -- On Statistical Testing of Random Numbers Generators -- Applied Authentication -- Lightweight Email Signatures (Extended Abstract) -- Shoehorning Security into the EPC Tag Standard -- Proof-Carrying Proxy Certificates -- Public Key Related Cryptanalysis -- Cryptanalysis of Rainbow -- An Improved LPN Algorithm -- Invited Talk -- Theory and Practice of Multiparty Computation
Dimensions
unknown
Extent
XI, 366 p. Also available online.
File format
multiple file formats
Form of item
electronic
Isbn
9783540380818
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/11832072
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-38081-8
Label
Security and Cryptography for Networks : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings, edited by Roberto Prisco, Moti Yung, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Distributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable Simultaneous Broadcast -- Signature Schemes Variants -- Relations Among Security Notions for Undeniable Signature Schemes -- Concurrent Blind Signatures Without Random Oracles -- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions -- Block Ciphers Analysis -- Understanding Two-Round Differentials in AES -- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b -- Anonymity and E-Commerce -- Constant-Size Dynamic k-TAA -- On Secure Orders in the Presence of Faults -- Balancing Accountability and Privacy Using E-Cash (Extended Abstract) -- Public Key Encryption and Key Exchange -- About the Security of MTI/C0 and MQV -- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles -- A New Key Exchange Protocol Based on MQV Assuming Public Computations -- Secret Sharing -- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants -- Cheating Immune (2,n)-Threshold Visual Secret Sharing -- Rational Secret Sharing, Revisited -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) -- Distinguishing Stream Ciphers with Convolutional Filters -- On Statistical Testing of Random Numbers Generators -- Applied Authentication -- Lightweight Email Signatures (Extended Abstract) -- Shoehorning Security into the EPC Tag Standard -- Proof-Carrying Proxy Certificates -- Public Key Related Cryptanalysis -- Cryptanalysis of Rainbow -- An Improved LPN Algorithm -- Invited Talk -- Theory and Practice of Multiparty Computation
Dimensions
unknown
Extent
XI, 366 p. Also available online.
File format
multiple file formats
Form of item
electronic
Isbn
9783540380818
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/11832072
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-38081-8

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...