1 option
Provable Security : First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings / edited by Willy Susilo, Joseph K. Liu, Yi Mu.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 4784.
- Security and Cryptology ; 4784
- Language:
- English
- Subjects (All):
- Computer security.
- Data structures (Computer science).
- Data encryption (Computer science).
- Electronic commerce.
- Computers.
- Law and legislation.
- Systems and Data Security.
- Data Structures and Information Theory.
- Cryptology.
- e-Commerce/e-business.
- Legal Aspects of Computing.
- Local Subjects:
- Systems and Data Security.
- Data Structures and Information Theory.
- Cryptology.
- e-Commerce/e-business.
- Legal Aspects of Computing.
- Physical Description:
- 1 online resource (X, 246 pages).
- Edition:
- First edition 2007.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
- System Details:
- text file PDF
- Contents:
- Authentication
- Stronger Security of Authenticated Key Exchange
- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels
- Asymmetric Encryption
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Signature
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
- Two Notes on the Security of Certificateless Signatures
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- Protocol and Proving Technique
- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use
- Does Secure Time-Stamping Imply Collision-Free Hash Functions?
- Formal Proof of Provable Security by Game-Playing in a Proof Assistant
- Authentication and Symmetric Encryption (Short Papers)
- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- Signature (Short Papers)
- Practical Threshold Signatures Without Random Oracles
- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
- Asymmetric Encryption (Short Papers)
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Decryptable Searchable Encryption.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-75670-5
- 9783540756705
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.