HOME > 상세정보

상세정보

Public key cryptography : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings

Public key cryptography : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings (1회 대출)

자료유형
단행본
개인저자
Imai, Hideki, 1943-. Zheng, Yuliang, 1962-.
서명 / 저자사항
Public key cryptography : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings / Hideki Imai, Yuliang Zheng (eds.).
발행사항
Berlin ;   New York :   Springer,   c2000.  
형태사항
xi, 483 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1751
ISBN
3540669671 (pbk. : alk. paper) 9783540669678 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Computers -- Access control -- Congresses. Data encryption (Computer science) -- Congresses. Public key cryptography -- Congresses.
000 02042camuu2200433 a 4500
001 000001049518
005 20091125143539
008 991209s2000 gw a b 101 0 eng
010 ▼a 99089214
020 ▼a 3540669671 (pbk. : alk. paper)
020 ▼a 9783540669678 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm43076911
035 ▼a (OCoLC)43076911
035 ▼a (KERIS)REF000005384218
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I567 2000
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I61p ▼c 2000
111 2 ▼a International Workshop on Practice and Theory in Public Key Cryptography ▼n (3rd : ▼d 2000 : ▼c Melbourne, Vic.)
245 1 0 ▼a Public key cryptography : ▼b Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings / ▼c Hideki Imai, Yuliang Zheng (eds.).
246 3 0 ▼a PKC 2000
246 3 0 ▼a Third International Workshop on Practice and Theory in Public Key Cryptosystems
246 3 ▼a 3rd International Workshop on Practice and Theory in Public Key Cryptosystems
246 3 0 ▼a International Workshop on Practice and Theory in Public Key Cryptosystems
246 3 0 ▼a Practice and Theory in Public Key Cryptosystems
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2000.
300 ▼a xi, 483 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1751
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computers ▼x Access control ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
650 0 ▼a Public key cryptography ▼v Congresses.
700 1 ▼a Imai, Hideki, ▼d 1943-.
700 1 ▼a Zheng, Yuliang, ▼d 1962-.
830 0 ▼a Lecture notes in computer science ; ▼v 1751.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I61p 2000 등록번호 121186604 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 세종학술정보원/과학기술실/ 청구기호 005.82 I61p 2000 등록번호 151081312 도서상태 대출가능 반납예정일 예약 서비스 M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I61p 2000 등록번호 121186604 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실/ 청구기호 005.82 I61p 2000 등록번호 151081312 도서상태 대출가능 반납예정일 예약 서비스 M

컨텐츠정보

목차

A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol.- An Efficient NICE-Schnorr-Type Signature Scheme.- Identification of Bad Signatures in Batches.- Some Remarks on a Fair Exchange Protocol.- Gaudry's Variant against C ab Curves.- An Identification Scheme Based on Sparse Polynomials.- A State-Based Model for Certificate Management Systems.- Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence.- The Composite Discrete Logarithm and Secure Authentication.- Chosen-Ciphertext Security for Any One-Way Cryptosystem.- Short Proofs of Knowledge for Factoring.- Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.- All-or-Nothing Transform and Remotely Keyed Encryption Protocols.- Security of Public Key Certificate Based Authentication Protocols.- Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2.- Key Recovery in Third Generation Wireless Communication Systems.- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications.- Certificates of Recoverability with Scalable Recovery Agent Security.- Design Validations for Discrete Logarithm Based Signature Schemes.- Optimally Efficient Accountable Time-Stamping.- "Pseudorandom Intermixing": A Tool for Shared Cryptography.- RSA-Based Auto-recoverable Cryptosystems.- Efficient and Fresh Certification.- Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions.- Cryptographic Approaches to Privacy in Forensic DNA Databases.- Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes.- Fast Implementation of Elliptic Curve Arithmetic in GF(p n ).- An Auction Protocol Which Hides Bids of Losers.- Forward Secrecy and Its Application to Future Mobile Communications Security.- Selecting Cryptographic Key Sizes.- A Structured ElGamal-Type Multisignature Scheme.


정보제공 : Aladin

관련분야 신착자료

Zumstein, Felix (2022)