|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Willy Susilo , Joseph K. Liu , Yi MuPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2007 ed. Volume: 4784 Dimensions: Width: 15.50cm , Height: 1.30cm , Length: 23.50cm Weight: 0.454kg ISBN: 9783540756699ISBN 10: 3540756698 Pages: 246 Publication Date: 24 October 2007 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsAuthentication.- Stronger Security of Authenticated Key Exchange.- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.- Asymmetric Encryption.- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts.- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks.- Signature.- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.- Two Notes on the Security of Certificateless Signatures.- A Provably Secure Ring Signature Scheme in Certificateless Cryptography.- Protocol and Proving Technique.- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use.- Does Secure Time-Stamping Imply Collision-Free Hash Functions?.- Formal Proof of Provable Security by Game-Playing in a Proof Assistant.- Authentication and Symmetric Encryption (Short Papers).- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers.- Signature (Short Papers).- Practical Threshold Signatures Without Random Oracles.- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.- Asymmetric Encryption (Short Papers).- Formal Security Treatments for Signatures from Identity-Based Encryption.- Decryptable Searchable Encryption.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |