skip to content
Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings Preview this item
ClosePreview this item
Checking...

Provable security : 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings

Author: Swee-Huay Heng; Kaoru Kurosawa
Publisher: Berlin [etc.] : SpringerLink, 2010.
Series: Lecture notes in computer science, 6402.; Lecture notes in artificial intelligence.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:

Constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference proceedings
Congresses
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Swee-Huay Heng; Kaoru Kurosawa
ISBN: 9783642162800 3642162800 9783642162794 3642162797
OCLC Number: 670049309
Description: 1 online resource : ill.
Contents: Identification.- Improved Zero-Knowledge Identification with Lattices.- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.- Auto Proofs.- A Calculus for Game-Based Security Proofs.- Automating Computational Proofs for Public-Key-Based Key Exchange.- Signature I.- A Framework for Constructing Convertible Undeniable Signatures.- Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm.- Hash Function.- Collision Resistant Double-Length Hashing.- Interpreting Hash Function Security Proofs.- Protocol.- Formal and Precise Analysis of Soundness of Several Shuffling Schemes.- Distinguishing Distributions Using Chernoff Information.- Signature II.- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.- Invited Talk.- Cryptographic Protocols from Lattices.- Encryption.- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.- Efficient Broadcast Encryption with Personalized Messages.- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.- Signcryption.- Identity Based Public Verifiable Signcryption Scheme.- Fully Secure Threshold Unsigncryption.
Series Title: Lecture notes in computer science, 6402.; Lecture notes in artificial intelligence.
Other Titles: ProvSec 2010
Responsibility: Swee-Huay Heng, Kaoru Kurosawa (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/670049309>
library:oclcnum"670049309"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/670049309>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:datePublished"2010"
schema:exampleOfWork<http://worldcat.org/entity/work/id/908187073>
schema:genre"Conference proceedings."
schema:genre"Conference proceedings"
schema:inLanguage"en"
schema:name"Provable security 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010 : proceedings"
schema:name"ProvSec 2010"
schema:publisher
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.