skip to content
Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings Preview this item
ClosePreview this item
Checking...

Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings

Author: Swee-Huay Heng; Kaoru Kurosawa
Publisher: Berlin ; New York : Springer, 2010.
Series: Lecture notes in computer science, 6402.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   Book : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:

Constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference proceedings
Congresses
Material Type: Conference publication
Document Type: Book
All Authors / Contributors: Swee-Huay Heng; Kaoru Kurosawa
ISBN: 9783642162794 3642162797
OCLC Number: 668190549
Description: x, 278 pages : illustrations ; 24 cm.
Contents: Identification.- Improved Zero-Knowledge Identification with Lattices.- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.- Auto Proofs.- A Calculus for Game-Based Security Proofs.- Automating Computational Proofs for Public-Key-Based Key Exchange.- Signature I.- A Framework for Constructing Convertible Undeniable Signatures.- Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm.- Hash Function.- Collision Resistant Double-Length Hashing.- Interpreting Hash Function Security Proofs.- Protocol.- Formal and Precise Analysis of Soundness of Several Shuffling Schemes.- Distinguishing Distributions Using Chernoff Information.- Signature II.- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.- Invited Talk.- Cryptographic Protocols from Lattices.- Encryption.- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.- Efficient Broadcast Encryption with Personalized Messages.- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.- Signcryption.- Identity Based Public Verifiable Signcryption Scheme.- Fully Secure Threshold Unsigncryption.
Series Title: Lecture notes in computer science, 6402.; LNCS sublibrary., SL 4,, Security and cryptology.
Responsibility: Swee-Huay Heng, Kaoru Kurosawa (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/668190549>
library:oclcnum"668190549"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:Book
rdf:valueUnknown value: cnp
schema:about
schema:about
schema:about
schema:about
schema:contributor
schema:contributor
schema:creator
schema:datePublished"2010"
schema:exampleOfWork<http://worldcat.org/entity/work/id/908187073>
schema:genre"Conference proceedings"@en
schema:inLanguage"en"
schema:isPartOf
schema:isPartOf
schema:name"Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings"@en
schema:publication
schema:publisher
schema:workExample
wdrs:describedby

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.