Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008667991/catalog> ?p ?o. }
Showing items 1 to 27 of
27
with 100 items per page.
- catalog contributor b12142889.
- catalog contributor b12142890.
- catalog created "2001.".
- catalog date "2001".
- catalog date "2001.".
- catalog dateCopyrighted "2001.".
- catalog description "Byoungcheon Lee, Kwangjo Kim -- Improved sheme of the gennaro-krawczyk-rabin undeniable signature system based on RSA / Takeru Miyazaki -- Efficient and secure member deletion in group signature schemes / Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee -- Efficient and practical scheme for privacy protection in the E-commerce of digital goods / Feng Bao, Robert H. Deng, Peirong Feng -- Internet anonymous auction scheme / Yi Mu, Vijay Varadharajan -- Efficient sealed-bid auction using hash chain / Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita -- Micropayments for wireless communications / DongGook Park, Colin Boyd, Ed Dawson -- Cryptographic applications of sparse polynomials over finite rings / William D. Banks [and others] -- Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors / Chanjoo Chung [and others] -- Hash to the rescue: space minimization for PKI directories / Adam Young --".
- catalog description "Design of the security evaluation system for decision support in the enterprise network security management / Jae Seung Lee, Sang Choon Kim, Seung Won Sohn.".
- catalog description "Includes bibliographical references and index.".
- catalog description "Note on the higher order differential attack of block ciphers with two-block structures / Ju-Sung Kang, Seongtaek Chee, Choonsik Park -- On the strength of KASUMI withour FL functions against higher order differential attack / Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko -- On MISTY1 higher order differential cryptanalysis / Steve Babbage, Laurent Frisch -- Difference distribution attack on DONUT and improved DONUT / Dong Hyeon Cheon [and others] -- New results on correlation immunity / Yuliang Zheng, Xian-Mo Zhang -- Elliptic curves and resilient functions / Jung Hee Cheon, Seongtaek Chee -- Fast universal hashing with small keys and no preprocessing: the polyR construction / Ted Krovetz, Phillip Rogaway -- Characterization of elliptic curve traces under FR-reduction / Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano -- Multi-party optimistic non-repudiation protocol / Olivier Markowitch, Steve Kremer -- Secure Matchmaking protocol /".
- catalog extent "x, 260 p. :".
- catalog identifier "3540417826 (softcover : alk. paper)".
- catalog isPartOf "Lecture notes in computer science ; 2015".
- catalog issued "2001".
- catalog issued "2001.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.8 21".
- catalog subject "Computer security Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "QA76.9.A25 I32 2000".
- catalog tableOfContents "Byoungcheon Lee, Kwangjo Kim -- Improved sheme of the gennaro-krawczyk-rabin undeniable signature system based on RSA / Takeru Miyazaki -- Efficient and secure member deletion in group signature schemes / Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee -- Efficient and practical scheme for privacy protection in the E-commerce of digital goods / Feng Bao, Robert H. Deng, Peirong Feng -- Internet anonymous auction scheme / Yi Mu, Vijay Varadharajan -- Efficient sealed-bid auction using hash chain / Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita -- Micropayments for wireless communications / DongGook Park, Colin Boyd, Ed Dawson -- Cryptographic applications of sparse polynomials over finite rings / William D. Banks [and others] -- Efficient anonymous fingerprinting of electronic information with improved automatic identification of redistributors / Chanjoo Chung [and others] -- Hash to the rescue: space minimization for PKI directories / Adam Young --".
- catalog tableOfContents "Design of the security evaluation system for decision support in the enterprise network security management / Jae Seung Lee, Sang Choon Kim, Seung Won Sohn.".
- catalog tableOfContents "Note on the higher order differential attack of block ciphers with two-block structures / Ju-Sung Kang, Seongtaek Chee, Choonsik Park -- On the strength of KASUMI withour FL functions against higher order differential attack / Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko -- On MISTY1 higher order differential cryptanalysis / Steve Babbage, Laurent Frisch -- Difference distribution attack on DONUT and improved DONUT / Dong Hyeon Cheon [and others] -- New results on correlation immunity / Yuliang Zheng, Xian-Mo Zhang -- Elliptic curves and resilient functions / Jung Hee Cheon, Seongtaek Chee -- Fast universal hashing with small keys and no preprocessing: the polyR construction / Ted Krovetz, Phillip Rogaway -- Characterization of elliptic curve traces under FR-reduction / Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano -- Multi-party optimistic non-repudiation protocol / Olivier Markowitch, Steve Kremer -- Secure Matchmaking protocol /".
- catalog title "Information security and cryptology : ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings / Dongho Won (ed.).".
- catalog type "Conference proceedings. fast".
- catalog type "text".