Security Protocols: International Workshop Cambridge, United Kingdom, April 10–12, 1996 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on computer security, cryptology, and coding theory at the Isaac Newton Institute.
The 17 revised full papers and one abstract included in the book were carefully selected. Among the topics addressed are several types of public key cryptosystems, digital cash, electronic commerce, digital signatures, and visual cryptography. Besides original theoretical results, the collection of papers show a strong applications-oriented component.

Author(s): Wenbo Mao (auth.), Mark Lomas (eds.)
Series: Lecture Notes in Computer Science 1189
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1997

Language: English
Pages: 203
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Computational Mathematics and Numerical Analysis; Communications Engineering, Networks

On cryptographic techniques for on-line bankcard payment transactions using open networks....Pages 1-17
A certification scheme for electronic commerce....Pages 19-32
Practical escrow cash systems....Pages 33-48
NetCard — A practical electronic-cash system....Pages 49-57
Electronic payments of small amounts....Pages 59-68
PayWord and MicroMint: Two simple micropayment schemes....Pages 69-87
Transactions using bets....Pages 89-92
Protocol failures for RSA-like functions using Lucas sequences and elliptic curves....Pages 93-100
Efficient and provable security amplifications....Pages 101-109
A comparison of RSA and the Naccache-Stern public-key cryptosystem....Pages 111-116
IEEE P1363: A standard for RSA, Diffie-Hellman, and Elliptic-Curve cryptography (abstract)....Pages 117-118
Efficient and secure conference-key distribution....Pages 119-129
Directed signatures and application to threshold cryptosystems....Pages 131-138
Key escrow in mutually mistrusting domains....Pages 139-153
Automatic event-stream notarization using digital signatures....Pages 155-169
Why isn't trust transitive?....Pages 171-176
Securing the residential asynchronous transfer mode networks....Pages 177-196
Visual cryptography II: Improving the contrast via the cover base....Pages 197-202