Skip to main content
  • Conference proceedings
  • © 2003

Security in Communication Networks

Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2576)

Conference series link(s): SCN: International Conference on Security and Cryptography for Networks

Conference proceedings info: SCN 2002.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

    Pages I-IX
  2. Forward Security

    1. Forward Secrecy in Password-Only Key Exchange Protocols

      • Jonathan Katz, Rafail Ostrovsky, Moti Yung
      Pages 29-44
    2. Weak Forward Security in Mediated RSA

      • Gene Tsudik
      Pages 45-54
  3. Foundations of Cryptography

    1. On the Power of Claw-Free Permutations

      • Yevgeniy Dodis, Leonid Reyzin
      Pages 55-73
    2. Equivocable and Extractable Commitment Schemes

      • Giovanni Di Crescenzo
      Pages 74-87
    3. An Improved Pseudorandom Generator Based on Hardness of Factoring

      • Nenad Dedić, Leonid Reyzin, Salil Vadhan
      Pages 88-101
  4. Key Management

    1. Efficient Re-keying Protocols for Multicast Encryption

      • Giovanni Di Crescenzo, Olga Kornievskaia
      Pages 119-132
    2. On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure

      • Frank Niedermeyer, Werner Schindler
      Pages 133-145
    3. A Group Key Distribution Scheme with Decentralised User Join

      • Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang
      Pages 146-163
  5. Cryptanalysis

    1. On a Resynchronization Weakness in a Class of Combiners with Memory

      • Yuri Borissov, ⋆Svetla Nikova, Bart Preneel, Joos Vandewalle
      Pages 164-173
    2. On Probability of Success in Linear and Differential Cryptanalysis

      • Ali Aydin Selçuk, Ali Biçak
      Pages 174-185
    3. Differential Cryptanalysis of a Reduced-Round SEED

      • Hitoshi Yanami, Takeshi Shimoyama
      Pages 186-198
  6. System Security

    1. Medical Information Privacy Assurance: Cryptographic and System Aspects

      • Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis
      Pages 199-218
  7. Signature Schemes

    1. How to Repair ESIGN

      • Louis Granboulan
      Pages 234-240
    2. Forward-Secure Signatures with Fast Key Update

      • Anton Kozlov, Leonid Reyzin
      Pages 241-256
    3. Constructing Elliptic Curves with Prescribed Embedding Degrees

      • Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
      Pages 257-267

Other Volumes

  1. Security in Communication Networks

Editors and Affiliations

  • Dipartimento di Informatica ed Applicazioni, Università di Salerno, Baronissi (SA), Italy

    Stelvio Cimato, Giuseppe Persiano

  • Dept. of Computer Engineering and Informatics, Computer Technology Institute and University of Patras, Rio, Greece

    Clemente Galdi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access