skip to content
Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings Preview this item
ClosePreview this item
Checking...

Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings

Author: Swee-Huay Heng; Kaoru Kurosawa
Publisher: Berlin ; New York : Springer, 2010.
Series: Lecture notes in computer science, 6402.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:

Constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference proceedings
Congresses
Material Type: Conference publication
Document Type: Book
All Authors / Contributors: Swee-Huay Heng; Kaoru Kurosawa
ISBN: 9783642162794 3642162797
OCLC Number: 668190549
Description: x, 278 pages : illustrations ; 24 cm.
Contents: Identification.- Improved Zero-Knowledge Identification with Lattices.- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.- Auto Proofs.- A Calculus for Game-Based Security Proofs.- Automating Computational Proofs for Public-Key-Based Key Exchange.- Signature I.- A Framework for Constructing Convertible Undeniable Signatures.- Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm.- Hash Function.- Collision Resistant Double-Length Hashing.- Interpreting Hash Function Security Proofs.- Protocol.- Formal and Precise Analysis of Soundness of Several Shuffling Schemes.- Distinguishing Distributions Using Chernoff Information.- Signature II.- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.- Invited Talk.- Cryptographic Protocols from Lattices.- Encryption.- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.- Efficient Broadcast Encryption with Personalized Messages.- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.- Signcryption.- Identity Based Public Verifiable Signcryption Scheme.- Fully Secure Threshold Unsigncryption.
Series Title: Lecture notes in computer science, 6402.; LNCS sublibrary., SL 4,, Security and cryptology.
Responsibility: Swee-Huay Heng, Kaoru Kurosawa (eds.).

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/668190549> # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "668190549" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/908187073#Place/berlin> ; # Berlin
    schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/cryptography> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/computer_security> ; # Computer security
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/133297795> ; # Swee-Huay Heng
    schema:contributor <http://viaf.org/viaf/66000211> ; # Kaoru Kurosawa
    schema:creator <http://experiment.worldcat.org/entity/work/data/908187073#Meeting/provsec_conference_4th_2010_malacca_malacca_malaysia> ; # ProvSec (Conference) (4th : 2010 : Malacca, Malacca, Malaysia)
    schema:datePublished "2010" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/908187073> ;
    schema:genre "Conference proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/908187073#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/908187073#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary: SL 4-security and cryptology
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/908187073#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:name "Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings"@en ;
    schema:productID "668190549" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/668190549#PublicationEvent/berlin_new_york_springer_2010> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/908187073#Agent/springer> ; # Springer
    schema:workExample <http://worldcat.org/isbn/9783642162794> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/668190549> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Meeting/provsec_conference_4th_2010_malacca_malacca_malaysia> # ProvSec (Conference) (4th : 2010 : Malacca, Malacca, Malaysia)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/908187073#Place/malacca_malacca_malaysia> ; # Malacca, Malacca, Malaysia)
    schema:name "ProvSec (Conference) (4th : 2010 : Malacca, Malacca, Malaysia)" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Place/malacca_malacca_malaysia> # Malacca, Malacca, Malaysia)
    a schema:Place ;
    schema:name "Malacca, Malacca, Malaysia)" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary: SL 4-security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
    schema:name "LNCS sublibrary: SL 4-security and cryptology" ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography"@en ;
    .

<http://viaf.org/viaf/133297795> # Swee-Huay Heng
    a schema:Person ;
    schema:familyName "Heng" ;
    schema:givenName "Swee-Huay" ;
    schema:name "Swee-Huay Heng" ;
    .

<http://viaf.org/viaf/66000211> # Kaoru Kurosawa
    a schema:Person ;
    schema:familyName "Kurosawa" ;
    schema:givenName "Kaoru" ;
    schema:name "Kaoru Kurosawa" ;
    .

<http://worldcat.org/isbn/9783642162794>
    a schema:ProductModel ;
    schema:isbn "3642162797" ;
    schema:isbn "9783642162794" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/668190549>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
    schema:dateModified "2015-05-18" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.