Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings /

The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Italy, on September 6-8, 2006. The conference was the ?fth in the SCN series, and this year marked a change in its name (the former name was Security in Communication Networks). The name change meant to bett...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Prisco, Roberto De (Επιμελητής έκδοσης), Yung, Moti (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4116
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Distributed Systems Security: Foundations
  • Edge Eavesdropping Games
  • Universally Composable Simultaneous Broadcast
  • Signature Schemes Variants
  • Relations Among Security Notions for Undeniable Signature Schemes
  • Concurrent Blind Signatures Without Random Oracles
  • Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions
  • Block Ciphers Analysis
  • Understanding Two-Round Differentials in AES
  • Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b
  • Anonymity and E-Commerce
  • Constant-Size Dynamic k-TAA
  • On Secure Orders in the Presence of Faults
  • Balancing Accountability and Privacy Using E-Cash (Extended Abstract)
  • Public Key Encryption and Key Exchange
  • About the Security of MTI/C0 and MQV
  • Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
  • A New Key Exchange Protocol Based on MQV Assuming Public Computations
  • Secret Sharing
  • Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants
  • Cheating Immune (2,n)-Threshold Visual Secret Sharing
  • Rational Secret Sharing, Revisited
  • Symmetric Key Cryptanalysis and Randomness
  • On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
  • Distinguishing Stream Ciphers with Convolutional Filters
  • On Statistical Testing of Random Numbers Generators
  • Applied Authentication
  • Lightweight Email Signatures (Extended Abstract)
  • Shoehorning Security into the EPC Tag Standard
  • Proof-Carrying Proxy Certificates
  • Public Key Related Cryptanalysis
  • Cryptanalysis of Rainbow
  • An Improved LPN Algorithm
  • Invited Talk
  • Theory and Practice of Multiparty Computation.