My Account Log in

1 option

Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings / edited by Ron Steinfeld, Tsz Hon Yuen.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Steinfeld, Ron, editor.
Yuen, Tsz Hon, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11821.
Security and Cryptology ; 11821
Language:
English
Subjects (All):
Data encryption (Computer science).
Computers.
Software engineering.
Cryptology.
Computing Milieux.
Information Systems and Communication Service.
Software Engineering/Programming and Operating Systems.
Local Subjects:
Cryptology.
Computing Milieux.
Information Systems and Communication Service.
Software Engineering/Programming and Operating Systems.
Physical Description:
1 online resource (XI, 382 pages) : 131 illustrations, 9 illustrations in color.
Edition:
First edition 2019.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2019.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The 18 full and 6 short papers presented were carefully reviewed and selected from 51 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on "Practical Security.".
Contents:
Lattice-based IBE with equality test in standard model
A critique of game-based definitions of receipt-freeness for voting
One-Round Authenticated Group Key Exchange from Isogenies
History-Free Sequential Aggregate MAC Revisited
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature
Secure Online/Offline Attribute-based Encryption for IOT Users in Cloud Computing
Identity-Concealed Authenticated Encryption from Ring Learning With Errors
Towards Enhanced Security for Certificateless Public-key Authenticated Encryption with Keyword Search
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-invisibility
A Lattice-Based Anonymous Distributed E-Cash from Bitcoin
Plaintext-Verifiably-Checkable Encryption
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
Hierarchical Functional Signcryption: Notion and Construction
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme
A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection
Password-based Authenticated Key Exchange from Standard Isogeny Assumptions
A centralized digital currency system with rich functions
A Practical Lattice-Based Sequential Aggregate Signature
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption
Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG
A Coin-Free Oracle-Based Augmented Black Box Framework
Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks
Solving ECDLP via List Decoding
On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training.
Other Format:
Printed edition:
ISBN:
978-3-030-31919-9
9783030319199
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account