Cantitate/Preț
Produs

Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings: Lecture Notes in Computer Science, cartea 4521

Editat de Jonathan Katz, Moti Yung
en Limba Engleză Paperback – 25 mai 2007

Din seria Lecture Notes in Computer Science

Preț: 34526 lei

Preț vechi: 43157 lei
-20% Nou

Puncte Express: 518

Preț estimativ în valută:
6607 6856$ 5523£

Carte tipărită la comandă

Livrare economică 15-29 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540727378
ISBN-10: 354072737X
Pagini: 502
Ilustrații: XIV, 502 p.
Dimensiuni: 156 x 234 x 32 mm
Greutate: 0.77 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Adult: General

Cuprins

Signature Schemes I.- Generic Transformation to Strongly Unforgeable Signatures.- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.- Merkle Signatures with Virtually Unlimited Signature Capacity.- Computer and Network Security.- Midpoints Versus Endpoints: From Protocols to Firewalls.- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.- Cryptanalysis.- Cryptanalysis of the TRMC-4 Public Key Cryptosystem.- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.- A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA.- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis.- Group-Oriented Security.- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.- Bayesian Methods for Practical Traitor Tracing.- Cryptographic Protocols.- A New Protocol for Conditional Disclosure of Secrets and Its Applications.- An Unconditionally Secure Protocol for Multi-Party Set Intersection.- Privacy-Preserving Set Union.- Anonymous Authentication.- Universal Accumulators with Efficient Nonmembership Proofs.- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.- Identity-Based Cryptography.- Identity-Based Proxy Re-encryption.- A More Natural Way to Construct Identity-Based Identification Schemes.- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions.- Certified E-Mail Protocol in the ID-Based Setting.- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks.- Efficient Content Authentication in Peer-to-Peer Networks.- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.- BAP: Broadcast Authentication Using Cryptographic Puzzles.- Efficient Implementation.- Compressed XTR.- Sliding Window Method for NTRU.- Signature Schemes II.- Efficient Certificateless Signature Schemes.- Security Mediated Certificateless Signatures.- Gradually Convertible Undeniable Signatures.