Provable Security: First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings

Author:   Willy Susilo ,  Joseph K. Liu ,  Yi Mu
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2007 ed.
Volume:   4784
ISBN:  

9783540756699


Pages:   246
Publication Date:   24 October 2007
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $158.27 Quantity:  
Add to Cart

Share |

Provable Security: First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings


Add your own review!

Overview

Full Product Details

Author:   Willy Susilo ,  Joseph K. Liu ,  Yi Mu
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2007 ed.
Volume:   4784
Dimensions:   Width: 15.50cm , Height: 1.30cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783540756699


ISBN 10:   3540756698
Pages:   246
Publication Date:   24 October 2007
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Authentication.- Stronger Security of Authenticated Key Exchange.- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.- Asymmetric Encryption.- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts.- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks.- Signature.- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.- Two Notes on the Security of Certificateless Signatures.- A Provably Secure Ring Signature Scheme in Certificateless Cryptography.- Protocol and Proving Technique.- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use.- Does Secure Time-Stamping Imply Collision-Free Hash Functions?.- Formal Proof of Provable Security by Game-Playing in a Proof Assistant.- Authentication and Symmetric Encryption (Short Papers).- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers.- Signature (Short Papers).- Practical Threshold Signatures Without Random Oracles.- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.- Asymmetric Encryption (Short Papers).- Formal Security Treatments for Signatures from Identity-Based Encryption.- Decryptable Searchable Encryption.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List