000 03726nam a22003855i 4500
001 300682
003 MX-SnUAN
005 20160429155639.0
007 cr nn 008mamaa
008 150903s2010 gw | o |||| 0|eng d
020 _a9783642153174
_99783642153174
024 7 _a10.1007/9783642153174
_2doi
035 _avtls000355682
039 9 _a201509031000
_bVLOAD
_c201405060353
_dVLOAD
_y201402191200
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.9.A25
100 1 _aGaray, Juan A.
_eeditor.
_9334240
245 1 0 _aSecurity and Cryptography for Networks :
_b7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings /
_cedited by Juan A. Garay, Roberto Prisco.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _avii, 474 páginas 54 ilustraciones
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6280
500 _aSpringer eBooks
505 0 _aEncryption I -- Time-Specific Encryption -- Public-Key Encryption with Efficient Amortized Updates -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor in Lattice-Based Cryptography -- Cryptanalysis -- Differential Fault Analysis of LEX -- Generalized RC4 Key Collisions and Hash Collisions -- Hash Functions -- On the Indifferentiability of the Grøstl Hash Function -- Side Channel Attacks and Leakage Resilience -- Algorithmic Tamper-Proof Security under Probing Attacks -- Leakage-Resilient Storage -- Encryption II -- Searching Keywords with Wildcards on Encrypted Data -- Threshold Attribute-Based Signcryption -- Cryptographic Protocols I -- Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation -- How to Pair with a Human -- Authentication and Key Agreement -- A New Security Model for Authenticated Key Agreement -- A Security Enhancement and Proof for Authentication and Key Agreement (AKA) -- Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model -- Cryptographic Primitives and Schemes -- Kleptography from Standard Assumptions and Applications -- Provably Secure Convertible Undeniable Signatures with Unambiguity -- History-Free Aggregate Message Authentication Codes -- Lattice-Based Cryptography -- Recursive Lattice Reduction -- Adaptively Secure Identity-Based Identification from Lattices without Random Oracles -- Groups Signatures and Authentication -- The Fiat–Shamir Transform for Group and Ring Signature Schemes -- Get Shorty via Group Signatures without Encryption -- Group Message Authentication -- Cryptographic Protocols II -- Fast Secure Computation of Set Intersection -- Distributed Private-Key Generators for Identity-Based Cryptography -- Anonymity -- Solving Revocation with Efficient Update of Anonymous Credentials.
520 _aThis book constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks held in Amalfi, Italy, in September 2010.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aPrisco, Roberto.
_eeditor.
_9331455
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783642153167
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-15317-4
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c300682
_d300682