Public Key Cryptography – PKC 2009 (Record no. 37709)

000 -LEADER
fixed length control field 04687nam a22005535i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783642004681
-- 978-3-642-00468-1
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
245 10 - TITLE STATEMENT
Title Public Key Cryptography – PKC 2009
Sub Title 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings /
Statement of responsibility, etc edited by Stanisław Jarecki, Gene Tsudik.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Berlin, Heidelberg :
Name of publisher Springer Berlin Heidelberg,
Year of publication 2009.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XI, 521 p.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Number Theory -- Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint -- The Security of All Bits Using List Decoding -- A New Lattice Construction for Partial Key Exposure Attack for RSA -- Subset-Restricted Random Walks for Pollard rho Method on -- Applications and Protocols -- Signing a Linear Subspace: Signature Schemes for Network Coding -- Improving the Boneh-Franklin Traitor Tracing Scheme -- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols -- Zero-Knowledge Proofs with Witness Elimination -- Multi-Party Protocols -- Distributed Public-Key Cryptography from Weak Secrets -- Asynchronous Multiparty Computation: Theory and Implementation -- Multi-Party Computation with Omnipresent Adversary -- Identity-Based Encryption -- Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data -- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts -- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys -- Removing Escrow from Identity-Based Encryption -- Signatures -- On the Theory and Practice of Personal Digital Signatures -- Security of Blind Signatures under Aborts -- Security of Sanitizable Signatures Revisited -- Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures -- Encryption -- CCA-Secure Proxy Re-encryption without Pairings -- Compact CCA-Secure Encryption for Messages of Arbitrary Length -- Verifiable Rotation of Homomorphic Encryptions -- New Cryptosystems and Optimizations -- A Practical Key Recovery Attack on Basic TCHo -- An Algebraic Surface Cryptosystem -- Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication -- Group Signatures and Anonymous Credentials -- Revocable Group Signature Schemes with Constant Costs for Signing and Verifying -- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials -- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009. The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials. .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Information Systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computers and Society.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Management of Computing and Information Systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Jarecki, Stanisław.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tsudik, Gene.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-00468-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-BOOKS
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2009.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
Holdings
Withdrawn status Lost status Damaged status Not for loan Current library Accession Number Uniform Resource Identifier Koha item type
        IMSc Library EBK8415 http://dx.doi.org/10.1007/978-3-642-00468-1 E-BOOKS
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha