Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11--13, 2002. Revised papers - MaRDI portal

Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11--13, 2002. Revised papers (Q1811808)

From MaRDI portal





scientific article; zbMATH DE number 1929530
Language Label Description Also known as
English
Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11--13, 2002. Revised papers
scientific article; zbMATH DE number 1929530

    Statements

    Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11--13, 2002. Revised papers (English)
    0 references
    17 June 2003
    0 references
    The articles of this volume will be reviewed individually. Indexed articles: \textit{Kushilevitz, Eyal}, Some applications of polynomials for the design of cryptographic protocols, 1-13 [Zbl 1022.68543] \textit{Maurer, Ueli}, Secure multi-party computation made simple, 14-28 [Zbl 1022.68547] \textit{Katz, Jonathan; Ostrovsky, Rafail; Yung, Moti}, Forward secrecy in password-only key exchange protocols, 29-44 [Zbl 1022.68541] \textit{Tsudik, Gene}, Weak forward security in mediated RSA, 45-54 [Zbl 1022.68555] \textit{Dodis, Yevgeniy; Reyzin, Leonid}, On the power of claw-free permutations, 55-73 [Zbl 1022.68051] \textit{Di Crescenzo, Giovanni}, Equivocable and extractable commitment schemes, 74-87 [Zbl 1022.68533] \textit{Dedić, Nenad; Reyzin, Leonid; Vadhan, Salil}, An improved pseudorandom generator based on hardness of factoring, 88-101 [Zbl 1022.68048] \textit{Itkis, Gene}, Intrusion-resilient signatures: Generic constructions, or defeating strong adversary with minimal assumptions, 102-118 [Zbl 1022.68052] \textit{Di Crescenzo, Giovanni; Kornievskaia, Olga}, Efficient re-keying protocols for multicast encryption, 119-132 [Zbl 1022.68532] \textit{Niedermeyer, Frank; Schindler, Werner}, On a class of key agreement protocols which cannot be unconditionally secure, 133-145 [Zbl 1022.68054] \textit{Kurnio, Hartono; Safavi-Naini, Rei; Wang, Huaxiong}, A group key distribution scheme with decentralised user join, 146-163 [Zbl 1022.68053] \textit{Borissov, Yuri; Nikova, Svetla; Preneel, Bart; Vandewalle, Joos}, On a resynchronization weakness in a class of combiners with memory, 164-173 [Zbl 1022.68047] \textit{Selçuk, Ali Aydın; Bıçak, Ali}, On probability of success in linear and differential cryptanalysis, 174-185 [Zbl 1022.68056] \textit{Yanami, Hitoshi; Shimoyama, Takeshi}, Differential cryptanalysis of a reduced-round SEED, 186-198 [Zbl 1022.68057] \textit{Ateniese, Giuseppe; Curtmola, Reza; de Medeiros, Breno; Davis, Darren}, Medical information privacy assurance: Cryptographic and system aspects, 199-218 [Zbl 1022.68526] \textit{Catuogno, Luigi; Visconti, Ivan}, A format-independent architecture for run-time integrity checking of executable code, 219-233 [Zbl 1022.68529] \textit{Granboulan, Louis}, How to repair ESIGN, 234-240 [Zbl 1022.68537] \textit{Kozlov, Anton; Reyzin, Leonid}, Forward-secure signatures with fast key update, 241-256 [Zbl 1022.68542] \textit{Barreto, Paulo S. L. M.; Lynn, Ben; Scott, Michael}, Constructing elliptic curves with prescribed embedding degrees, 257-267 [Zbl 1022.94008] \textit{Camenisch, Jan; Lysyanskaya, Anna}, A signature scheme with efficient protocols, 268-289 [Zbl 1022.68528] \textit{Desmedt, Yvo; Wang, Yongge}, Efficient zero-knowledge proofs for some practical graph problems, 290-302 [Zbl 1022.68050] \textit{Deng, Xiaotie; Lee, C. H.; Zhao, Yunlei; Zhu, Hong}, Reduction zero-knowledge, 303-317 [Zbl 1022.68049] \textit{Cheung, Shirley H. C.; Deng, Xiaotie; Lee, C. H.; Zhao, Yunlei}, A new notion of soundness in bare public-key model, 318-325 [Zbl 1022.68530] \textit{Beimel, Amos; Stahl, Yoav}, Robust information-theoretic private information retrieval, 326-341 [Zbl 1022.68527] \textit{Prabhu, B.; Srinathan, K.; Rangan, C. Pandu}, Trading players for efficiency in unconditional multiparty computation, 342-353 [Zbl 1022.68552] \textit{Martí-Farré, Jaume; Padró, Carles}, Secret sharing schemes on access structures with intersection number equal to one, 354-363 [Zbl 1022.68546]
    0 references
    Security
    0 references
    Communication networks
    0 references
    SCN 2002
    0 references
    Amalfi, Italy
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references