Security Protocols: 12th International Workshop, Cambridge, by Bruce Christianson (auth.), Bruce Christianson, Bruno

By Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.)

Here are the complaints of the twelfth overseas Workshop on safety P- tocols. we are hoping that you'll get pleasure from them, and they will reason you to imagine a minimum of one heretical idea. Please write or email and proportion it with us. Our subject this workshop used to be “Authentic Privacy.” frequently we have now dependent authentication upon a slightly powerful idea of id, and feature then equipped different defense providers on best of authentication. maybe if we'd like a extra nuanced suggestion of privateness, then we have to reassess a few of our assu- tions, really whilst attackers and defenders proportion an identical assets and infrastructure. the placement papers released the following were revised through the contributors within the workshop, and are via edited (heavily sometimes) transcripts of elements of the discussions which they led. Our due to Sidney Sussex CollegeCambridgefor using their amenities, to Johanna Hunt on the collage of Hertfordshire for organizing the logistics of the workshop and orchestrating the construction of those court cases, to Lori KlimaszewskaoftheUniversityofCambridgeComputingServicefortranscribing the audio tapes (in which “viruses with out halos” may have brought on havoc yet didn’t), and to Donald Hunt for impeccable copyediting. eventually, it really is either a unhappiness and a excitement to pay our tribute to David Wheeler,oneoftheoriginalforty-ninersattheCambridgeComputerLaboratory and writer of the preliminary orders for EDSAC. the second one model of preliminary orders is the Platonic bootstrap.

Show description

Read or Download Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers PDF

Similar computers books

Fire in the Valley: The Birth and Death of the Personal Computer

Within the Seventies, whereas their contemporaries have been protesting the pc as a device of dehumanization and oppression, a motley selection of collage dropouts, hippies, and electronics lovers have been engaged in anything even more subversive. keen about the assumption of having laptop strength into their very own arms, they introduced from their garages a hobbyist stream that grew into an undefined, and finally a social and technological revolution.

STACS 2006: 23rd Annual Symposium on Theoretical Aspects of Computer Science, Marseille, France, February 23-25, 2006. Proceedings

This publication constitutes the refereed lawsuits of the twenty third Annual Symposium on Theoretical features of computing device technological know-how, STACS 2006, held in Marseille, France, in February 2006. The fifty four revised complete papers awarded including 3 invited papers have been rigorously reviewed and chosen from 283 submissions.

Compel (Vol. 23, 2004): Special Issue

Unique factor: chosen papers from PMAPS 2002 -Conference on Probabilistic tools utilized to energy platforms, Naples 2002

Additional info for Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers

Sample text

I start with an extended example which underlies the entire talk. It is about privacy authentication. The scenario is that we have a customer here who wants to rent a car. She will have to have a driver’s licence from some administration; the licence will contain name, address, age, etc. She will also need a credit card containing her name as well. Then she shows these documents to the car rental company, and provides them with all this data. This is not necessarily bad because for instance if the customer decides to steal a car I will need some data about the customer to call the police, so some data might really be required.

Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Joan Feigenbaum, editor, Advances in Cryptology – CRYPTO ’91, volume 576 of LNCS, pages 129–140. Springer Verlag, 1992. 48. David Pointcheval and Jacques Stern. Security proofs for signature schemes. In Ueli Maurer, editor, Advances in Cryptology — EUROCRYPT ’96, volume 1070 of LNCS, pages 387–398. Springer Verlag, 1996. 49. Joseph Silverman. The Arithmetic of Elliptic Curves. Springer-Verlag, 1986.

Camenisch and Stadler [22] came up with the first group signature scheme where the size of the public key was independent of the size of the group. Subsequent work in this area [24,20] put forth a more general framework for group signatures. Finally, Ateniese et al. [4] invented the first provably secure group signature scheme (see also Camenisch and Michels [19] and Cramer and Shoup [32] that paved the way for the Ateniese et al. scheme). Anonymous credential systems as described above were introduced by Lysyanskaya et al.

Download PDF sample

Rated 4.28 of 5 – based on 7 votes

Related posts