Franklin

Provable Security [electronic resource] : First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings / edited by Willy Susilo, Joseph K. Liu, Yi Mu.

Edition:
1st ed. 2007.
Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology SL 4, 4784
Security and Cryptology ; 4784
Format/Description:
Book
1 online resource (X, 246 pages)
Subjects:
Computer security.
Data structures (Computer science).
Data encryption (Computer science).
Electronic commerce.
Computers.
Law and legislation.
Local subjects:
Systems and Data Security. (search)
Data Structures and Information Theory. (search)
Cryptology. (search)
e-Commerce/e-business. (search)
Legal Aspects of Computing. (search)
System Details:
text file PDF
Contents:
Authentication
Stronger Security of Authenticated Key Exchange
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels
Asymmetric Encryption
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
Signature
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
Two Notes on the Security of Certificateless Signatures
A Provably Secure Ring Signature Scheme in Certificateless Cryptography
Protocol and Proving Technique
Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use
Does Secure Time-Stamping Imply Collision-Free Hash Functions?
Formal Proof of Provable Security by Game-Playing in a Proof Assistant
Authentication and Symmetric Encryption (Short Papers)
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security
On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
Signature (Short Papers)
Practical Threshold Signatures Without Random Oracles
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
Asymmetric Encryption (Short Papers)
Formal Security Treatments for Signatures from Identity-Based Encryption
Decryptable Searchable Encryption.
Contributor:
Susilo, Willy, editor., Editor,
Liu, Joseph K. editor., Editor,
Mu, Yi, editor., Editor,
SpringerLink (Online service)
Contained In:
Springer eBooks
Other format:
Printed edition:
Printed edition:
ISBN:
978-3-540-75670-5
9783540756705
Publisher Number:
10.1007/978-3-540-75670-5 doi
Access Restriction:
Restricted for use by site license.
Loading...
Location Notes Your Loan Policy
Description Status Barcode Your Loan Policy