Matches in Harvard for { <http://id.lib.harvard.edu/aleph/007849619/catalog> ?p ?o. }
Showing items 1 to 33 of
33
with 100 items per page.
- catalog abstract "This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.".
- catalog contributor b10867099.
- catalog contributor b10867100.
- catalog created "c1998.".
- catalog date "1998".
- catalog date "c1998.".
- catalog dateCopyrighted "c1998.".
- catalog description "Includes bibliographical references and index.".
- catalog description "Secure books : protecting the distribution of knowledge / Ross J. Anderson [and others] -- Protocols using anonymous connections : mobile applications / Michael G. Reed, Paul F. Syverson and David M. Goldschlag -- Receipt-free electronic voting schemes for large scale elections / Tatsuaki Okamoto -- Flexible internet secure transactions based on collaborative domains / Eduardo Solana, Jürgen Harms -- How to build evidence in a public-key infrastructure for multi-domain environments / Bruno Crispo -- On signature schemes with threshold verification detecting malicious verifiers / Holger Petersen, Markus Michels -- Open key exchange : how to defeat dictionary attacks without encrypting public keys / Stefan Lucks -- Protocol interactions and the chosen protocol attack / John Kelsey, Bruce Schneier and David Wagner -- Binding bit patterns to real world entities / Bruce Christianson, James A. Malcolm -- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults / Feng Bao [and others] -- Low cost attacks on tamper resistant devices / Ross J. Anderson, Markus Kuhn -- Entity authentication and authenticated key transport protocols employing asymmetric techniques / Simon Blake-Wilson, Alfred Menezes -- SG logic : a formal analysis technique for authentication protocols / Sigrid Gürgens -- How to convert any digital signature scheme into a group signature scheme / Holger Petersen -- Threshold key-recovery systems for RSA / Tatsuaki Okamoto -- A weakness of Menezes-Vanstone cryptosystem / Klaus Kiefer -- On ideal non-perfect secret sharing schemes / Pascal Paillier.".
- catalog description "This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.".
- catalog extent "viii, 216 p. :".
- catalog identifier "3540640401 (alk. paper : softcover)".
- catalog isPartOf "Lecture notes in computer science, 0302-9743 ; 1361".
- catalog issued "1998".
- catalog issued "c1998.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.8 21".
- catalog subject "Combinatorics.".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Computer security Congresses.".
- catalog subject "Computer software.".
- catalog subject "Computers Access control Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "QA76.9.A25 S44 1998".
- catalog subject "Telecommunication.".
- catalog tableOfContents "Secure books : protecting the distribution of knowledge / Ross J. Anderson [and others] -- Protocols using anonymous connections : mobile applications / Michael G. Reed, Paul F. Syverson and David M. Goldschlag -- Receipt-free electronic voting schemes for large scale elections / Tatsuaki Okamoto -- Flexible internet secure transactions based on collaborative domains / Eduardo Solana, Jürgen Harms -- How to build evidence in a public-key infrastructure for multi-domain environments / Bruno Crispo -- On signature schemes with threshold verification detecting malicious verifiers / Holger Petersen, Markus Michels -- Open key exchange : how to defeat dictionary attacks without encrypting public keys / Stefan Lucks -- Protocol interactions and the chosen protocol attack / John Kelsey, Bruce Schneier and David Wagner -- Binding bit patterns to real world entities / Bruce Christianson, James A. Malcolm -- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults / Feng Bao [and others] -- Low cost attacks on tamper resistant devices / Ross J. Anderson, Markus Kuhn -- Entity authentication and authenticated key transport protocols employing asymmetric techniques / Simon Blake-Wilson, Alfred Menezes -- SG logic : a formal analysis technique for authentication protocols / Sigrid Gürgens -- How to convert any digital signature scheme into a group signature scheme / Holger Petersen -- Threshold key-recovery systems for RSA / Tatsuaki Okamoto -- A weakness of Menezes-Vanstone cryptosystem / Klaus Kiefer -- On ideal non-perfect secret sharing schemes / Pascal Paillier.".
- catalog title "Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings / Bruce Christianson ... [et al.].".
- catalog type "Conference proceedings. fast".
- catalog type "Paris (1997) swd".
- catalog type "text".