000 04011nam a22003855i 4500
001 296416
003 MX-SnUAN
005 20160429155310.0
007 cr nn 008mamaa
008 150903s2006 gw | o |||| 0|eng d
020 _a9783540380818
_99783540380818
024 7 _a10.1007/11832072
_2doi
035 _avtls000349406
039 9 _a201509030737
_bVLOAD
_c201404121219
_dVLOAD
_c201404090956
_dVLOAD
_y201402071201
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.9.A25
100 1 _aPrisco, Roberto.
_eeditor.
_9331455
245 1 0 _aSecurity and Cryptography for Networks :
_b5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings /
_cedited by Roberto Prisco, Moti Yung.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2006.
300 _axI, 366 páginas Also available online.
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v4116
500 _aSpringer eBooks
505 0 _aDistributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable Simultaneous Broadcast -- Signature Schemes Variants -- Relations Among Security Notions for Undeniable Signature Schemes -- Concurrent Blind Signatures Without Random Oracles -- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions -- Block Ciphers Analysis -- Understanding Two-Round Differentials in AES -- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b -- Anonymity and E-Commerce -- Constant-Size Dynamic k-TAA -- On Secure Orders in the Presence of Faults -- Balancing Accountability and Privacy Using E-Cash (Extended Abstract) -- Public Key Encryption and Key Exchange -- About the Security of MTI/C0 and MQV -- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles -- A New Key Exchange Protocol Based on MQV Assuming Public Computations -- Secret Sharing -- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants -- Cheating Immune (2,n)-Threshold Visual Secret Sharing -- Rational Secret Sharing, Revisited -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) -- Distinguishing Stream Ciphers with Convolutional Filters -- On Statistical Testing of Random Numbers Generators -- Applied Authentication -- Lightweight Email Signatures (Extended Abstract) -- Shoehorning Security into the EPC Tag Standard -- Proof-Carrying Proxy Certificates -- Public Key Related Cryptanalysis -- Cryptanalysis of Rainbow -- An Improved LPN Algorithm -- Invited Talk -- Theory and Practice of Multiparty Computation.
520 _aThis book constitutes the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006, held in Maiori, Italy in September 2006. The 24 revised full papers presented together with the abstract of an invited talk were carefully revised and selected from 81 submissions. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and public key related cryptanalisis.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aYung, Moti.
_eeditor.
_9329299
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783540380801
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/11832072
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c296416
_d296416