My Account Log in

1 option

Provable Security : First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings / edited by Willy Susilo, Joseph K. Liu, Yi Mu.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Susilo, Willy, editor.
Liu, Joseph K., editor.
Mu, Yi, 1955- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 4784.
Security and Cryptology ; 4784
Language:
English
Subjects (All):
Computer security.
Data structures (Computer science).
Data encryption (Computer science).
Electronic commerce.
Computers.
Law and legislation.
Systems and Data Security.
Data Structures and Information Theory.
Cryptology.
e-Commerce/e-business.
Legal Aspects of Computing.
Local Subjects:
Systems and Data Security.
Data Structures and Information Theory.
Cryptology.
e-Commerce/e-business.
Legal Aspects of Computing.
Physical Description:
1 online resource (X, 246 pages).
Edition:
First edition 2007.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
System Details:
text file PDF
Contents:
Authentication
Stronger Security of Authenticated Key Exchange
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels
Asymmetric Encryption
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
Signature
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
Two Notes on the Security of Certificateless Signatures
A Provably Secure Ring Signature Scheme in Certificateless Cryptography
Protocol and Proving Technique
Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use
Does Secure Time-Stamping Imply Collision-Free Hash Functions?
Formal Proof of Provable Security by Game-Playing in a Proof Assistant
Authentication and Symmetric Encryption (Short Papers)
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security
On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
Signature (Short Papers)
Practical Threshold Signatures Without Random Oracles
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
Asymmetric Encryption (Short Papers)
Formal Security Treatments for Signatures from Identity-Based Encryption
Decryptable Searchable Encryption.
Other Format:
Printed edition:
ISBN:
978-3-540-75670-5
9783540756705
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account