Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers /
The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe“DioceseHall”oftheArchdioceseofAmal?-Cavade’ Tirreni and the “Armorial Bearings Hall” of the Archbishop Palace in Amal?, Italy, on September 8–10, 2004. Previous conferences also took place in Amal? in 1...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3352 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talk
- ECRYPT: The Cryptographic Research Challenges for the Next Decade
- Reduction of Security/Primitives
- Relationships Between Diffie-Hellman and “Index Oracles”
- On the Security Notions for Public-Key Encryption Schemes
- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel
- Signature Schemes
- A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs
- Group Signatures with Separate and Distributed Authorities
- Threshold Cryptography in Mobile Ad Hoc Networks
- Anonymity and Privacy
- Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map
- Group Signatures: Better Efficiency and New Theoretical Aspects
- Efficient Blind Signatures Without Random Oracles
- Authentication and Identification
- Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)
- On the Key Exposure Problem in Chameleon Hashes
- Zero Knowledge
- Identity-Based Zero-Knowledge
- Public Key Cryptosystems
- A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation
- Efficient Key Encapsulation to Multiple Parties
- Improved Signcryption from q-Diffie-Hellman Problems
- Distributed Cryptography
- Colored Visual Cryptography Without Color Darkening
- On the Size of Monotone Span Programs
- Universally Composable DKG with Linear Number of Exponentiations
- Cryptanalysis of Public Key Cryptosystems
- An Algebraic Approach to NTRU (q = 2 n ) via Witt Vectors and Overdetermined Systems of Nonlinear Equations
- Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC
- Cryptanalysis
- The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters
- Non-randomness of the Full 4 and 5-Pass HAVAL
- Email Security
- Controlling Spam by Secure Internet Content Selection
- Key Distribution and Feedback Shift Registers
- On Session Identifiers in Provably Secure Protocols
- How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers.