Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11--13, 2002. Revised papers (Q1811808)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11--13, 2002. Revised papers |
scientific article; zbMATH DE number 1929530
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11--13, 2002. Revised papers |
scientific article; zbMATH DE number 1929530 |
Statements
Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11--13, 2002. Revised papers (English)
0 references
17 June 2003
0 references
The articles of this volume will be reviewed individually. Indexed articles: \textit{Kushilevitz, Eyal}, Some applications of polynomials for the design of cryptographic protocols, 1-13 [Zbl 1022.68543] \textit{Maurer, Ueli}, Secure multi-party computation made simple, 14-28 [Zbl 1022.68547] \textit{Katz, Jonathan; Ostrovsky, Rafail; Yung, Moti}, Forward secrecy in password-only key exchange protocols, 29-44 [Zbl 1022.68541] \textit{Tsudik, Gene}, Weak forward security in mediated RSA, 45-54 [Zbl 1022.68555] \textit{Dodis, Yevgeniy; Reyzin, Leonid}, On the power of claw-free permutations, 55-73 [Zbl 1022.68051] \textit{Di Crescenzo, Giovanni}, Equivocable and extractable commitment schemes, 74-87 [Zbl 1022.68533] \textit{Dedić, Nenad; Reyzin, Leonid; Vadhan, Salil}, An improved pseudorandom generator based on hardness of factoring, 88-101 [Zbl 1022.68048] \textit{Itkis, Gene}, Intrusion-resilient signatures: Generic constructions, or defeating strong adversary with minimal assumptions, 102-118 [Zbl 1022.68052] \textit{Di Crescenzo, Giovanni; Kornievskaia, Olga}, Efficient re-keying protocols for multicast encryption, 119-132 [Zbl 1022.68532] \textit{Niedermeyer, Frank; Schindler, Werner}, On a class of key agreement protocols which cannot be unconditionally secure, 133-145 [Zbl 1022.68054] \textit{Kurnio, Hartono; Safavi-Naini, Rei; Wang, Huaxiong}, A group key distribution scheme with decentralised user join, 146-163 [Zbl 1022.68053] \textit{Borissov, Yuri; Nikova, Svetla; Preneel, Bart; Vandewalle, Joos}, On a resynchronization weakness in a class of combiners with memory, 164-173 [Zbl 1022.68047] \textit{Selçuk, Ali Aydın; Bıçak, Ali}, On probability of success in linear and differential cryptanalysis, 174-185 [Zbl 1022.68056] \textit{Yanami, Hitoshi; Shimoyama, Takeshi}, Differential cryptanalysis of a reduced-round SEED, 186-198 [Zbl 1022.68057] \textit{Ateniese, Giuseppe; Curtmola, Reza; de Medeiros, Breno; Davis, Darren}, Medical information privacy assurance: Cryptographic and system aspects, 199-218 [Zbl 1022.68526] \textit{Catuogno, Luigi; Visconti, Ivan}, A format-independent architecture for run-time integrity checking of executable code, 219-233 [Zbl 1022.68529] \textit{Granboulan, Louis}, How to repair ESIGN, 234-240 [Zbl 1022.68537] \textit{Kozlov, Anton; Reyzin, Leonid}, Forward-secure signatures with fast key update, 241-256 [Zbl 1022.68542] \textit{Barreto, Paulo S. L. M.; Lynn, Ben; Scott, Michael}, Constructing elliptic curves with prescribed embedding degrees, 257-267 [Zbl 1022.94008] \textit{Camenisch, Jan; Lysyanskaya, Anna}, A signature scheme with efficient protocols, 268-289 [Zbl 1022.68528] \textit{Desmedt, Yvo; Wang, Yongge}, Efficient zero-knowledge proofs for some practical graph problems, 290-302 [Zbl 1022.68050] \textit{Deng, Xiaotie; Lee, C. H.; Zhao, Yunlei; Zhu, Hong}, Reduction zero-knowledge, 303-317 [Zbl 1022.68049] \textit{Cheung, Shirley H. C.; Deng, Xiaotie; Lee, C. H.; Zhao, Yunlei}, A new notion of soundness in bare public-key model, 318-325 [Zbl 1022.68530] \textit{Beimel, Amos; Stahl, Yoav}, Robust information-theoretic private information retrieval, 326-341 [Zbl 1022.68527] \textit{Prabhu, B.; Srinathan, K.; Rangan, C. Pandu}, Trading players for efficiency in unconditional multiparty computation, 342-353 [Zbl 1022.68552] \textit{Martí-Farré, Jaume; Padró, Carles}, Secret sharing schemes on access structures with intersection number equal to one, 354-363 [Zbl 1022.68546]
0 references
Security
0 references
Communication networks
0 references
SCN 2002
0 references
Amalfi, Italy
0 references