Security in Communication Networks

Third International Conference, SCN 2002 Amalfi, Italy, September 11–13, 2002 Revised Papers

  • Stelvio Cimato
  • Giuseppe Persiano
  • Clemente Galdi
Conference proceedings SCN 2002

DOI: 10.1007/3-540-36413-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2576)

Table of contents (26 papers)

  1. Front Matter
    Pages I-IX
  2. Invited Talks

  3. Forward Security

    1. Forward Secrecy in Password-Only Key Exchange Protocols
      Jonathan Katz, Rafail Ostrovsky, Moti Yung
      Pages 29-44
    2. Weak Forward Security in Mediated RSA
      Gene Tsudik
      Pages 45-54
  4. Foundations of Cryptography

  5. Key Management

    1. Efficient Re-keying Protocols for Multicast Encryption
      Giovanni Di Crescenzo, Olga Kornievskaia
      Pages 119-132
    2. On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure
      Frank Niedermeyer, Werner Schindler
      Pages 133-145
    3. A Group Key Distribution Scheme with Decentralised User Join
      Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang
      Pages 146-163
  6. Cryptanalysis

    1. On a Resynchronization Weakness in a Class of Combiners with Memory
      Yuri Borissov, ⋆Svetla Nikova, Bart Preneel, Joos Vandewalle
      Pages 164-173
    2. On Probability of Success in Linear and Differential Cryptanalysis
      Ali Aydin Selçuk, Ali Biçak
      Pages 174-185
    3. Differential Cryptanalysis of a Reduced-Round SEED
      Hitoshi Yanami, Takeshi Shimoyama
      Pages 186-198
  7. System Security

    1. Medical Information Privacy Assurance: Cryptographic and System Aspects
      Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis
      Pages 199-218
  8. Signature Schemes

    1. How to Repair ESIGN
      Louis Granboulan
      Pages 234-240
    2. Forward-Secure Signatures with Fast Key Update
      Anton Kozlov, Leonid Reyzin
      Pages 241-256
    3. Constructing Elliptic Curves with Prescribed Embedding Degrees
      Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
      Pages 257-267

About these proceedings


Code Information Signatur anonymity authentication communication data security hash functions information security information theory network security networks privacy secret sharing secure communication

Editors and affiliations

  • Stelvio Cimato
    • 1
  • Giuseppe Persiano
    • 1
  • Clemente Galdi
    • 2
  1. 1.Dipartimento di Informatica ed ApplicazioniUniversità di SalernoBaronissi (SA)Italy
  2. 2.Dept. of Computer Engineering and InformaticsComputer Technology Institute and University of PatrasRioGreece

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-00420-2
  • Online ISBN 978-3-540-36413-9
  • Series Print ISSN 0302-9743