skip to content
Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings Preview this item
ClosePreview this item
Checking...

Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings

Author: Swee-Huay Heng; Kaoru Kurosawa
Publisher: Berlin ; New York : Springer, 2010.
Series: Lecture notes in computer science, 6402.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:

Constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference papers and proceedings
Congresses
Material Type: Conference publication
Document Type: Book
All Authors / Contributors: Swee-Huay Heng; Kaoru Kurosawa
ISBN: 9783642162794 3642162797
OCLC Number: 668190549
Description: x, 278 pages : illustrations ; 24 cm.
Contents: Identification.- Improved Zero-Knowledge Identification with Lattices.- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.- Auto Proofs.- A Calculus for Game-Based Security Proofs.- Automating Computational Proofs for Public-Key-Based Key Exchange.- Signature I.- A Framework for Constructing Convertible Undeniable Signatures.- Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm.- Hash Function.- Collision Resistant Double-Length Hashing.- Interpreting Hash Function Security Proofs.- Protocol.- Formal and Precise Analysis of Soundness of Several Shuffling Schemes.- Distinguishing Distributions Using Chernoff Information.- Signature II.- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.- Invited Talk.- Cryptographic Protocols from Lattices.- Encryption.- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.- Efficient Broadcast Encryption with Personalized Messages.- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.- Signcryption.- Identity Based Public Verifiable Signcryption Scheme.- Fully Secure Threshold Unsigncryption.
Series Title: Lecture notes in computer science, 6402.; LNCS sublibrary., SL 4,, Security and cryptology.
Responsibility: Swee-Huay Heng, Kaoru Kurosawa (eds.).

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/668190549> # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "668190549" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/908187073#Place/berlin> ; # Berlin
   schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/cryptography> ; # Cryptography
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/computer_security> ; # Computer security
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://dewey.info/class/005.82/e23/> ;
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/133297795> ; # Swee-Huay Heng
   schema:contributor <http://experiment.worldcat.org/entity/work/data/908187073#Person/kurosawa_kaoru> ; # Kaoru Kurosawa
   schema:creator <http://experiment.worldcat.org/entity/work/data/908187073#Meeting/provsec_conference_4th_2010_malacca_malacca_malaysia> ; # ProvSec (Conference) (4th : 2010 : Malacca, Malacca, Malaysia)
   schema:datePublished "2010" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/908187073> ;
   schema:genre "Conference papers and proceedings"@en ;
   schema:genre "Conference publication"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science,
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/908187073#Series/lncs_sublibrary> ; # LNCS sublibrary.
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/908187073#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary: SL 4-security and cryptology
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/908187073#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
   schema:name "Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings"@en ;
   schema:productID "668190549" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/668190549#PublicationEvent/berlin_new_york_springer_2010> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/908187073#Agent/springer> ; # Springer
   schema:workExample <http://worldcat.org/isbn/9783642162794> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/668190549> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
   schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Meeting/provsec_conference_4th_2010_malacca_malacca_malaysia> # ProvSec (Conference) (4th : 2010 : Malacca, Malacca, Malaysia)
    a bgn:Meeting, schema:Event ;
   schema:location <http://experiment.worldcat.org/entity/work/data/908187073#Place/malacca_malacca_malaysia> ; # Malacca, Malacca, Malaysia)
   schema:name "ProvSec (Conference) (4th : 2010 : Malacca, Malacca, Malaysia)" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Person/kurosawa_kaoru> # Kaoru Kurosawa
    a schema:Person ;
   schema:familyName "Kurosawa" ;
   schema:givenName "Kaoru" ;
   schema:name "Kaoru Kurosawa" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Place/malacca_malacca_malaysia> # Malacca, Malacca, Malaysia)
    a schema:Place ;
   schema:name "Malacca, Malacca, Malaysia)" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
   schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
   schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary: SL 4-security and cryptology
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
   schema:name "LNCS sublibrary: SL 4-security and cryptology" ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
   schema:name "Cryptography"@en ;
    .

<http://viaf.org/viaf/133297795> # Swee-Huay Heng
    a schema:Person ;
   schema:familyName "Heng" ;
   schema:givenName "Swee-Huay" ;
   schema:name "Swee-Huay Heng" ;
    .

<http://worldcat.org/isbn/9783642162794>
    a schema:ProductModel ;
   schema:isbn "3642162797" ;
   schema:isbn "9783642162794" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science,
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
   schema:issn "0302-9743" ;
   schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/668190549>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/668190549> ; # Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings
   schema:dateModified "2016-05-11" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.