Security Protocols
Springer Berlin (Verlag)
978-3-540-64040-0 (ISBN)
Secure books: Protecting the distribution of knowledge.- Protocols using anonymous connections: Mobile applications.- Receipt-free electronic voting schemes for large scale elections.- Flexible internet secure transactions based on collaborative domains.- How to build evidence in a public-key infrastructure for multi-domain environments.- On signature schemes with threshold verification detecting malicious verifiers.- Open key exchange: How to defeat dictionary attacks without encrypting public keys.- Protocol interactions and the chosen protocol attack.- Binding bit patterns to real world entities.- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults.- Low cost attacks on tamper resistant devices.- Entity authentication and authenticated key transport protocols employing asymmetric techniques.- SG logic - a formal analysis technique for authentication protocols.- How to convert any digital signature scheme into a group signature scheme.- Threshold key-recovery systems for RSA.- A weakness of the Menezes-Vanstone cryptosystem.- On ideal non-perfect secret sharing schemes.
Erscheint lt. Verlag | 14.1.1998 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | VIII, 220 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 348 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • Algorithmen • authentication • combinatorics • cryptographic protocol • cryptographic protocols • Cryptosystems • digital signature • Digital Signatures • digital signature scheme • Internet • Internet Transactions • Kryptographie / Kryptologie • Secret Sharing • security protocols • verification |
ISBN-10 | 3-540-64040-1 / 3540640401 |
ISBN-13 | 978-3-540-64040-0 / 9783540640400 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich