default search action
Search dblp for Publications
export results for "toc:db/conf/scn/scn2002.bht:"
@proceedings{DBLP:conf/scn/2002, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36413-7}, doi = {10.1007/3-540-36413-7}, isbn = {3-540-00420-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AtenieseCMD02, author = {Giuseppe Ateniese and Reza Curtmola and Breno de Medeiros and Darren Davis}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Medical Information Privacy Assurance: Cryptographic and System Aspects}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {199--218}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_15}, doi = {10.1007/3-540-36413-7\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/AtenieseCMD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BarretoLS02, author = {Paulo S. L. M. Barreto and Ben Lynn and Michael Scott}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Constructing Elliptic Curves with Prescribed Embedding Degrees}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {257--267}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_19}, doi = {10.1007/3-540-36413-7\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BarretoLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BeimelS02, author = {Amos Beimel and Yoav Stahl}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Robust Information-Theoretic Private Information Retrieval}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {326--341}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_24}, doi = {10.1007/3-540-36413-7\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BeimelS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BorissovNPV02, author = {Yuri L. Borissov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {On a Resynchronization Weakness in a Class of Combiners with Memory}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {164--173}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_12}, doi = {10.1007/3-540-36413-7\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BorissovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CamenischL02, author = {Jan Camenisch and Anna Lysyanskaya}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {A Signature Scheme with Efficient Protocols}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {268--289}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_20}, doi = {10.1007/3-540-36413-7\_20}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/CamenischL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CatuognoV02, author = {Luigi Catuogno and Ivan Visconti}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {219--233}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_16}, doi = {10.1007/3-540-36413-7\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/CatuognoV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CheungDLZ02, author = {Shirley H. C. Cheung and Xiaotie Deng and Chan H. Lee and Yunlei Zhao}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {A New Notion of Soundness in Bare Public-Key Model}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {318--325}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_23}, doi = {10.1007/3-540-36413-7\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/CheungDLZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Crescenzo02, author = {Giovanni Di Crescenzo}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Equivocable and Extractable Commitment Schemes}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {74--87}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_6}, doi = {10.1007/3-540-36413-7\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Crescenzo02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CrescenzoK02, author = {Giovanni Di Crescenzo and Olga Kornievskaia}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Efficient Re-keying Protocols for Multicast Encryption}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {119--132}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_9}, doi = {10.1007/3-540-36413-7\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/CrescenzoK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DedicRV02, author = {Nenad Dedic and Leonid Reyzin and Salil P. Vadhan}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {An Improved Pseudorandom Generator Based on Hardness of Factoring}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {88--101}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_7}, doi = {10.1007/3-540-36413-7\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DedicRV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DengLZZ02, author = {Xiaotie Deng and Chan H. Lee and Yunlei Zhao and Hong Zhu}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Reduction Zero-Knowledge}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {303--317}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_22}, doi = {10.1007/3-540-36413-7\_22}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DengLZZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DesmedtW02, author = {Yvo Desmedt and Yongge Wang}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Efficient Zero-Knowledge Proofs for Some Practical Graph Problems}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {290--302}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_21}, doi = {10.1007/3-540-36413-7\_21}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/DesmedtW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DodisR02, author = {Yevgeniy Dodis and Leonid Reyzin}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {On the Power of Claw-Free Permutations}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {55--73}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_5}, doi = {10.1007/3-540-36413-7\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DodisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Granboulan02, author = {Louis Granboulan}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {How to Repair {ESIGN}}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {234--240}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_17}, doi = {10.1007/3-540-36413-7\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Granboulan02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Itkis02, author = {Gene Itkis}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {102--118}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_8}, doi = {10.1007/3-540-36413-7\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Itkis02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KatzOY02, author = {Jonathan Katz and Rafail Ostrovsky and Moti Yung}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Forward Secrecy in Password-Only Key Exchange Protocols}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {29--44}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_3}, doi = {10.1007/3-540-36413-7\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KatzOY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KozlovR02, author = {Anton Kozlov and Leonid Reyzin}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Forward-Secure Signatures with Fast Key Update}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {241--256}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_18}, doi = {10.1007/3-540-36413-7\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KozlovR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KurnioSW02, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {A Group Key Distribution Scheme with Decentralised User Join}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {146--163}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_11}, doi = {10.1007/3-540-36413-7\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KurnioSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Kushilevitz02, author = {Eyal Kushilevitz}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Some Applications of Polynomials for the Design of Cryptographic Protocols}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {1--13}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_1}, doi = {10.1007/3-540-36413-7\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Kushilevitz02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Marti-FarreP02, author = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and Carles Padr{\'{o}}}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Secret Sharing Schemes on Access Structures with Intersection Number Equal to One}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {354--363}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_26}, doi = {10.1007/3-540-36413-7\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Marti-FarreP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Maurer02, author = {Ueli M. Maurer}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Secure Multi-party Computation Made Simple}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {14--28}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_2}, doi = {10.1007/3-540-36413-7\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Maurer02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NiedermeyerS02, author = {Frank Niedermeyer and Werner Schindler}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {133--145}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_10}, doi = {10.1007/3-540-36413-7\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/NiedermeyerS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PrabhuSR02, author = {B. Prabhu and K. Srinathan and C. Pandu Rangan}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Trading Players for Efficiency in Unconditional Multiparty Computation}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {342--353}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_25}, doi = {10.1007/3-540-36413-7\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PrabhuSR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/SelcukB02, author = {Ali Aydin Sel{\c{c}}uk and Ali Bi{\c{c}}ak}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {On Probability of Success in Linear and Differential Cryptanalysis}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {174--185}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_13}, doi = {10.1007/3-540-36413-7\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/SelcukB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Tsudik02, author = {Gene Tsudik}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Weak Forward Security in Mediated {RSA}}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {45--54}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_4}, doi = {10.1007/3-540-36413-7\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Tsudik02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/YanamiS02, author = {Hitoshi Yanami and Takeshi Shimoyama}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Differential Cryptanalysis of a Reduced-Round {SEED}}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {186--198}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_14}, doi = {10.1007/3-540-36413-7\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/YanamiS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.