Security Protocols
Secure books: Protecting the distribution of knowledge.- Protocols using anonymous connections: Mobile applications.- Receipt-free electronic voting schemes for large scale elections.- Flexible internet secure transactions based on collaborative domains.- How to build evidence in a public-key infrastructure for multi-domain environments.- On signature schemes with threshold verification detecting malicious verifiers.- Open key exchange: How to defeat dictionary attacks without encrypting public keys.- Protocol interactions and the chosen protocol attack.- Binding bit patterns to real world entities.- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults.- Low cost attacks on tamper resistant devices.- Entity authentication and authenticated key transport protocols employing asymmetric techniques.- SG logic - a formal analysis technique for authentication protocols.- How to convert any digital signature scheme into a group signature scheme.- Threshold key-recovery systems for RSA.- A weakness of the Menezes-Vanstone cryptosystem.- On ideal non-perfect secret sharing schemes.
| Erscheint lt. Verlag | 14.1.1998 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | VIII, 220 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 348 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Algorithm analysis and problem complexity • Algorithmen • authentication • combinatorics • cryptographic protocol • cryptographic protocols • Cryptosystems • digital signature • Digital Signatures • digital signature scheme • Internet • Internet Transactions • Kryptographie / Kryptologie • Secret Sharing • security protocols • verification |
| ISBN-13 | 9783540640400 / 9783540640400 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich