000 | 04100nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-540-69688-9 | ||
003 | DE-He213 | ||
005 | 20240423132522.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s1998 gw | s |||| 0|eng d | ||
020 |
_a9783540696889 _9978-3-540-69688-9 |
||
024 | 7 |
_a10.1007/BFb0028154 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aSecurity Protocols _h[electronic resource] : _b5th International Workshop, Paris, France, April 7-9, 1997, Proceedings / _cedited by Bruce Christianson, Bruno Crispo, Mark Lomas, Michael Roe. |
250 | _a1st ed. 1998. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c1998. |
|
300 |
_aVIII, 220 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1361 |
|
505 | 0 | _aSecure books: Protecting the distribution of knowledge -- Protocols using anonymous connections: Mobile applications -- Receipt-free electronic voting schemes for large scale elections -- Flexible internet secure transactions based on collaborative domains -- How to build evidence in a public-key infrastructure for multi-domain environments -- On signature schemes with threshold verification detecting malicious verifiers -- Open key exchange: How to defeat dictionary attacks without encrypting public keys -- Protocol interactions and the chosen protocol attack -- Binding bit patterns to real world entities -- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults -- Low cost attacks on tamper resistant devices -- Entity authentication and authenticated key transport protocols employing asymmetric techniques -- SG logic — a formal analysis technique for authentication protocols -- How to convert any digital signature scheme into a group signature scheme -- Threshold key-recovery systems for RSA -- A weakness of the Menezes-Vanstone cryptosystem -- On ideal non-perfect secret sharing schemes. | |
520 | _aThis book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect. | ||
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aDiscrete mathematics. | |
650 | 0 | _aTelecommunication. | |
650 | 1 | 4 | _aCryptology. |
650 | 2 | 4 | _aAlgorithms. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aDiscrete Mathematics. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
700 | 1 |
_aChristianson, Bruce. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aCrispo, Bruno. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLomas, Mark. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aRoe, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540640400 |
776 | 0 | 8 |
_iPrinted edition: _z9783662189986 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1361 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/BFb0028154 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-BAE | ||
942 | _cSPRINGER | ||
999 |
_c188642 _d188642 |