Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings /
The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Italy, on September 6-8, 2006. The conference was the ?fth in the SCN series, and this year marked a change in its name (the former name was Security in Communication Networks). The name change meant to bett...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4116 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Distributed Systems Security: Foundations
- Edge Eavesdropping Games
- Universally Composable Simultaneous Broadcast
- Signature Schemes Variants
- Relations Among Security Notions for Undeniable Signature Schemes
- Concurrent Blind Signatures Without Random Oracles
- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions
- Block Ciphers Analysis
- Understanding Two-Round Differentials in AES
- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b
- Anonymity and E-Commerce
- Constant-Size Dynamic k-TAA
- On Secure Orders in the Presence of Faults
- Balancing Accountability and Privacy Using E-Cash (Extended Abstract)
- Public Key Encryption and Key Exchange
- About the Security of MTI/C0 and MQV
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
- A New Key Exchange Protocol Based on MQV Assuming Public Computations
- Secret Sharing
- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants
- Cheating Immune (2,n)-Threshold Visual Secret Sharing
- Rational Secret Sharing, Revisited
- Symmetric Key Cryptanalysis and Randomness
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Distinguishing Stream Ciphers with Convolutional Filters
- On Statistical Testing of Random Numbers Generators
- Applied Authentication
- Lightweight Email Signatures (Extended Abstract)
- Shoehorning Security into the EPC Tag Standard
- Proof-Carrying Proxy Certificates
- Public Key Related Cryptanalysis
- Cryptanalysis of Rainbow
- An Improved LPN Algorithm
- Invited Talk
- Theory and Practice of Multiparty Computation.