Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / Edition 1

Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / Edition 1

ISBN-10:
3540640401
ISBN-13:
9783540640400
Pub. Date:
02/27/1998
Publisher:
Springer Berlin Heidelberg
ISBN-10:
3540640401
ISBN-13:
9783540640400
Pub. Date:
02/27/1998
Publisher:
Springer Berlin Heidelberg
Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / Edition 1

Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / Edition 1

Paperback

$54.99 Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Prools, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security prools. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic prools, authentication, threshold systems, secret sharing, ect.

Product Details

ISBN-13: 9783540640400
Publisher: Springer Berlin Heidelberg
Publication date: 02/27/1998
Series: Lecture Notes in Computer Science , #1361
Edition description: 1998
Pages: 220
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Secure books: Protecting the distribution of knowledge.- Prools using anonymous connections: Mobile applications.- Receipt-free electronic voting schemes for large scale elections.- Flexible internet secure transactions based on collaborative domains.- How to build evidence in a public-key infrastructure for multi-domain environments.- On signature schemes with threshold verification detecting malicious verifiers.- Open key exchange: How to defeat dictionary attacks without encrypting public keys.- Prool interactions and the chosen prool attack.- Binding bit patterns to real world entities.- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults.- Low cost attacks on tamper resistant devices.- Entity authentication and authenticated key transport prools employing asymmetric techniques.- SG logic — a formal analysis technique for authentication prools.- How to convert any digital signature scheme into a group signature scheme.- Threshold key-recovery systems for RSA.- A weakness of the Menezes-Vanstone cryptosystem.- On ideal non-perfect secret sharing schemes.
From the B&N Reads Blog

Customer Reviews