1 option
Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings / edited by Ron Steinfeld, Tsz Hon Yuen.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 11821.
- Security and Cryptology ; 11821
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Computers.
- Software engineering.
- Cryptology.
- Computing Milieux.
- Information Systems and Communication Service.
- Software Engineering/Programming and Operating Systems.
- Local Subjects:
- Cryptology.
- Computing Milieux.
- Information Systems and Communication Service.
- Software Engineering/Programming and Operating Systems.
- Physical Description:
- 1 online resource (XI, 382 pages) : 131 illustrations, 9 illustrations in color.
- Edition:
- First edition 2019.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2019.
- System Details:
- text file PDF
- Summary:
- This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The 18 full and 6 short papers presented were carefully reviewed and selected from 51 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on "Practical Security.".
- Contents:
- Lattice-based IBE with equality test in standard model
- A critique of game-based definitions of receipt-freeness for voting
- One-Round Authenticated Group Key Exchange from Isogenies
- History-Free Sequential Aggregate MAC Revisited
- An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature
- Secure Online/Offline Attribute-based Encryption for IOT Users in Cloud Computing
- Identity-Concealed Authenticated Encryption from Ring Learning With Errors
- Towards Enhanced Security for Certificateless Public-key Authenticated Encryption with Keyword Search
- TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-invisibility
- A Lattice-Based Anonymous Distributed E-Cash from Bitcoin
- Plaintext-Verifiably-Checkable Encryption
- Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
- Hierarchical Functional Signcryption: Notion and Construction
- FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme
- A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection
- Password-based Authenticated Key Exchange from Standard Isogeny Assumptions
- A centralized digital currency system with rich functions
- A Practical Lattice-Based Sequential Aggregate Signature
- Provably Secure Proactive Secret Sharing Without the Adjacent Assumption
- Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG
- A Coin-Free Oracle-Based Augmented Black Box Framework
- Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks
- Solving ECDLP via List Decoding
- On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-030-31919-9
- 9783030319199
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.