

Hardcover ISBN: | 978-0-8218-6590-3 |
Product Code: | DIMACS/2 |
List Price: | $78.00 |
MAA Member Price: | $70.20 |
AMS Member Price: | $62.40 |


Hardcover ISBN: | 978-0-8218-6590-3 |
Product Code: | DIMACS/2 |
List Price: | $78.00 |
MAA Member Price: | $70.20 |
AMS Member Price: | $62.40 |
-
Book DetailsDIMACS - Series in Discrete Mathematics and Theoretical Computer ScienceVolume: 2; 1991; 262 ppMSC: Primary 68; 94; Secondary 03
This book, the second volume in the DIMACS book series and published jointly with the Association for Computing Machinery, contains the proceedings of a workshop held in Princeton, New Jersey, in October 1989. The workshop, which drew seventy-four participants from five countries, addressed a wide range of practical and theoretical questions arising in the overlap of distributed computation and cryptography. In addition to fifteen papers based on formal talks presented at the workshop, this volume also contains two contributed papers on related topics, and an extensive summary of informal discussions that took place during the workshop, including some open questions raised.
The book requires basic background in computer science and either a familiarity with the notation and terminology of distributed computing and cryptography, or a willingness to do some background reading. Students, researchers, and engineers interested in the theoretical and practical aspects of distributed computing and cryptography will appreciate the overview the book provides.
Co-published with the Center for Discrete Mathematics and Theoretical Computer Science beginning with Volume 8. Volumes 1–7 were co-published with the Association for Computer Machinery (ACM).
-
Table of Contents
-
Chapters
-
Open questions, talk abstracts, and summary of discussions
-
Formal definitions for secure distributed protocols
-
Perfect privacy for two-party protocols
-
On the structure of secret key exchange protocols
-
Privacy-enhanced electronic mail
-
Program result checking against adaptive programs and in cryptographic settings
-
The scope of a logic of authentication
-
Secure policy enforcement in internetworks
-
On expected polynomial time simulation of zero knowledge protocols
-
Cryptographic protection of databases and software
-
Secret bit transmission using a random deal of cards
-
Security against replay chosen-ciphertext attack
-
New directions in testing
-
Towards a theory of cryptographic systems: A critique of crypto-complexity
-
Feedback in discrete communication
-
On necessary conditions for secure distributed computation
-
Secure IX network
-
Reasoning about cryptographic protocols
-
-
RequestsReview Copy – for publishers of book reviewsAccessibility – to request an alternate format of an AMS title
- Book Details
- Table of Contents
- Requests
This book, the second volume in the DIMACS book series and published jointly with the Association for Computing Machinery, contains the proceedings of a workshop held in Princeton, New Jersey, in October 1989. The workshop, which drew seventy-four participants from five countries, addressed a wide range of practical and theoretical questions arising in the overlap of distributed computation and cryptography. In addition to fifteen papers based on formal talks presented at the workshop, this volume also contains two contributed papers on related topics, and an extensive summary of informal discussions that took place during the workshop, including some open questions raised.
The book requires basic background in computer science and either a familiarity with the notation and terminology of distributed computing and cryptography, or a willingness to do some background reading. Students, researchers, and engineers interested in the theoretical and practical aspects of distributed computing and cryptography will appreciate the overview the book provides.
Co-published with the Center for Discrete Mathematics and Theoretical Computer Science beginning with Volume 8. Volumes 1–7 were co-published with the Association for Computer Machinery (ACM).
-
Chapters
-
Open questions, talk abstracts, and summary of discussions
-
Formal definitions for secure distributed protocols
-
Perfect privacy for two-party protocols
-
On the structure of secret key exchange protocols
-
Privacy-enhanced electronic mail
-
Program result checking against adaptive programs and in cryptographic settings
-
The scope of a logic of authentication
-
Secure policy enforcement in internetworks
-
On expected polynomial time simulation of zero knowledge protocols
-
Cryptographic protection of databases and software
-
Secret bit transmission using a random deal of cards
-
Security against replay chosen-ciphertext attack
-
New directions in testing
-
Towards a theory of cryptographic systems: A critique of crypto-complexity
-
Feedback in discrete communication
-
On necessary conditions for secure distributed computation
-
Secure IX network
-
Reasoning about cryptographic protocols