|Listed in category:
Have one to sell?

Public Key Cryptography : Third International Workshop on Practice and Theory...

Great Book Prices Store
(336331)
Registered as a business seller
US $85.35
Approximately£62.70
Condition:
New
3 available
Breathe easy. Returns accepted.
Postage:
Free USPS Media MailTM.
Located in: Jessup, Maryland, United States
Delivery:
Estimated between Tue, 24 Jun and Mon, 30 Jun
Estimated delivery dates - opens in a new window or tab reflect seller's dispatch time, origin postcode, destination postcode and time of order receipt, and will depend on the delivery service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods, and are an estimate only.
Returns:
14 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Payments:
    Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:365553001595
Last updated on 11 Jun, 2025 12:24:37 BSTView all revisionsView all revisions

Item specifics

Condition
New: A new, unread, unused book in perfect condition with no missing or damaged pages. See the ...
Book Title
Public Key Cryptography : Third International Workshop on Practic
ISBN
9783540669678

About this product

Product Identifiers

Publisher
Springer Berlin / Heidelberg
ISBN-10
3540669671
ISBN-13
9783540669678
eBay Product ID (ePID)
1686095

Product Key Features

Number of Pages
Xiv, 490 Pages
Language
English
Publication Name
Public Key Cryptography : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 2000, Proceedings
Subject
Programming / General, Operating Systems / General, Security / Cryptography
Publication Year
2000
Type
Textbook
Author
Yuliang Zheng
Subject Area
Computers
Series
Lecture Notes in Computer Science Ser.
Format
Trade Paperback

Dimensions

Item Weight
54.3 Oz
Item Length
9.3 in
Item Width
6.1 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
99-089214
Dewey Edition
21
Series Volume Number
1751
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8/2
Table Of Content
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol.- An Efficient NICE-Schnorr-Type Signature Scheme.- Identification of Bad Signatures in Batches.- Some Remarks on a Fair Exchange Protocol.- Gaudry's Variant against C ab Curves.- An Identification Scheme Based on Sparse Polynomials.- A State-Based Model for Certificate Management Systems.- Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence.- The Composite Discrete Logarithm and Secure Authentication.- Chosen-Ciphertext Security for Any One-Way Cryptosystem.- Short Proofs of Knowledge for Factoring.- Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.- All-or-Nothing Transform and Remotely Keyed Encryption Protocols.- Security of Public Key Certificate Based Authentication Protocols.- Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2.- Key Recovery in Third Generation Wireless Communication Systems.- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications.- Certificates of Recoverability with Scalable Recovery Agent Security.- Design Validations for Discrete Logarithm Based Signature Schemes.- Optimally Efficient Accountable Time-Stamping.- "Pseudorandom Intermixing": A Tool for Shared Cryptography.- RSA-Based Auto-recoverable Cryptosystems.- Efficient and Fresh Certification.- Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions.- Cryptographic Approaches to Privacy in Forensic DNA Databases.- Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes.- Fast Implementation of Elliptic Curve Arithmetic in GF(p n ).- An Auction Protocol Which Hides Bids of Losers.- Forward Secrecy and Its Application to Future MobileCommunications Security.- Selecting Cryptographic Key Sizes.- A Structured ElGamal-Type Multisignature Scheme.
Synopsis
ThePKC2000conferencewasheldattheMelbourneExhibitionCentre, Victoria, Australia, January 18-20, 2000. It was the third conference in the international workshop series dedicated to practice and theory in public key cryptography. The program committee of the conference received 70 full submissions from around the world, of which 31 were selected for presentation. All submissions were reviewed by experts in the relevant areas. The program committee consisted of 19 experts in cryptography and data se- rity drawn from the international research community, these being Chin-Chen Chang (National Chung Cheng University, Taiwan), Claude Cr epeau (McGill University, Canada), Ed Dawson (Queensland University of Technology, A- tralia), Yvo Desmedt (Florida State University, USA), Hideki Imai (Co-chair, UniversityofTokyo, Japan), MarkusJakobsson(BellLabs, USA), KwangjoKim (Information and Communications University, Korea), Arjen Lenstra (Citibank, USA), TsutomuMatsumoto(YokohamaNationalUniversity, Japan), DavidN- cache (Gemplus, France), Eiji Okamoto (University of Wisconsin-Milwaukee, USA), TatsuakiOkamoto(NTTLabs, Japan), JosefPieprzyk(UniversityofW- longong, Australia), Jean-Jacques Quisquater (Universit e Catholique de L- vain, Belgium), Nigel Smart (HP Labs Bristol, UK), Vijay Varadharajan (U- versity of Western Sydney, Australia), Serge Vaudenay (Ecole Polytechnique F ed erale de Lausanne, Switzerland), Moti Yung (CertCo, USA), and Yuliang Zheng (Co-chair, Monash University, Australia). Members of the committee spent numerous hours in reviewing the submissions and providing advice and comments on the selection of papers., ThePKC2000conferencewasheldattheMelbourneExhibitionCentre,Victoria, Australia, January 18-20, 2000. It was the third conference in the international workshop series dedicated to practice and theory in public key cryptography. The program committee of the conference received 70 full submissions from around the world, of which 31 were selected for presentation. All submissions were reviewed by experts in the relevant areas. The program committee consisted of 19 experts in cryptography and data se- rity drawn from the international research community, these being Chin-Chen Chang (National Chung Cheng University, Taiwan), Claude Cr´ epeau (McGill University, Canada), Ed Dawson (Queensland University of Technology, A- tralia), Yvo Desmedt (Florida State University, USA), Hideki Imai (Co-chair, UniversityofTokyo,Japan),MarkusJakobsson(BellLabs,USA),KwangjoKim (Information and Communications University, Korea), Arjen Lenstra (Citibank, USA),TsutomuMatsumoto(YokohamaNationalUniversity,Japan),DavidN- cache (Gemplus, France), Eiji Okamoto (University of Wisconsin-Milwaukee, USA),TatsuakiOkamoto(NTTLabs,Japan),JosefPieprzyk(UniversityofW- longong, Australia), Jean-Jacques Quisquater (Universit´ e Catholique de L- vain, Belgium), Nigel Smart (HP Labs Bristol, UK), Vijay Varadharajan (U- versity of Western Sydney, Australia), Serge Vaudenay (Ecole Polytechnique F´ ed´ erale de Lausanne, Switzerland), Moti Yung (CertCo, USA), and Yuliang Zheng (Co-chair, Monash University, Australia). Members of the committee spent numerous hours in reviewing the submissions and providing advice and comments on the selection of papers.
LC Classification Number
QA268

Item description from the seller

Seller business information

I certify that all my selling activities will comply with all EU laws and regulations.
About this seller

Great Book Prices Store

96.6% positive Feedback1.3M items sold

Joined Feb 2017
Usually responds within 24 hours
Registered as a business seller

Detailed seller ratings

Average for the last 12 months
Accurate description
4.9
Reasonable postage cost
5.0
Delivery time
4.9
Communication
4.8

Seller Feedback (381,181)

All ratings
Positive
Neutral
Negative
  • n***b (466)- Feedback left by buyer.
    Past month
    Verified purchase
    Awesome book and a phenomenal seller! It arrived exactly as described, shipped extremely fast, and was a great value. It was packed securely and made it to me without any damage. The seller also had excellent communication. Thank you for a pleasant transaction!
  • l***1 (1465)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Great seller; book exactly as described in mint condition sold at a reasonable price; seller shipped item FAST, FREE and with tracking information, a must nowadays; seller shipped in tight, cardboard mailing envelope, which tightly fit over the book, preventing damage in shipment; good communication too; rate seller 10+++++
  • r***k (215)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    100% as described and pictured. Book was well-packed and shipped out in a reasonable time. Arrived in perfect condition. Good communication with seller. I recommend seller Great Book Prices Store and will not hesitate to purchase from them again in the future. Smooth transaction. 5 stars. Thanks.