skip to content
Provable Security : 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings Preview this item
ClosePreview this item
Checking...

Provable Security : 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings

Author: Swee-Huay Heng; Kaoru Kurosawa
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Series: Lecture Notes in Computer Science, 6402.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Publication:Provable security.
Database:WorldCat
Summary:

Constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Swee-Huay Heng; Kaoru Kurosawa
ISBN: 9783642162800 3642162800 9783642162794 3642162797
OCLC Number: 731498707
Notes: Computer Science (Springer-11645).
Description: 1 online resource (Online-Datei.)
Contents: Identification.- Improved Zero-Knowledge Identification with Lattices.- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.- Auto Proofs.- A Calculus for Game-Based Security Proofs.- Automating Computational Proofs for Public-Key-Based Key Exchange.- Signature I.- A Framework for Constructing Convertible Undeniable Signatures.- Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm.- Hash Function.- Collision Resistant Double-Length Hashing.- Interpreting Hash Function Security Proofs.- Protocol.- Formal and Precise Analysis of Soundness of Several Shuffling Schemes.- Distinguishing Distributions Using Chernoff Information.- Signature II.- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.- Invited Talk.- Cryptographic Protocols from Lattices.- Encryption.- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.- Efficient Broadcast Encryption with Personalized Messages.- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.- Signcryption.- Identity Based Public Verifiable Signcryption Scheme.- Fully Secure Threshold Unsigncryption.
Series Title: Lecture Notes in Computer Science, 6402.
Responsibility: edited by Swee-Huay Heng, Kaoru Kurosawa.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/731498707> # Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
   library:oclcnum "731498707" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/xxk> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/908187073#Place/berlin_heidelberg> ; # Berlin, Heidelberg
   schema:about <http://id.worldcat.org/fast/866237> ; # Coding theory
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/management_of_computing_and_information_systems> ; # Management of Computing and Information Systems
   schema:about <http://id.loc.gov/authorities/subjects/sh85027654> ; # Coding theory
   schema:about <http://dewey.info/class/005.82/> ;
   schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/computer_communication_networks> ; # Computer Communication Networks
   schema:about <http://id.loc.gov/authorities/subjects/sh85035859> ; # Data protection
   schema:about <http://id.worldcat.org/fast/872527> ; # Computer software
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/data_encryption> ; # Data Encryption
   schema:about <http://id.loc.gov/authorities/subjects/sh85029534> ; # Computer software
   schema:about <http://id.loc.gov/authorities/subjects/sh89003285> ; # Computer science
   schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/computer_science> ; # Computer Science
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/systems_and_data_security> ; # Systems and Data Security
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/coding_and_information_theory> ; # Coding and Information Theory
   schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/information_systems> ; # Information Systems
   schema:about <http://experiment.worldcat.org/entity/work/data/908187073#Topic/algorithm_analysis_and_problem_complexity> ; # Algorithm Analysis and Problem Complexity
   schema:bookFormat schema:EBook ;
   schema:contributor <http://experiment.worldcat.org/entity/work/data/908187073#Person/kurosawa_kaoru> ; # Kaoru Kurosawa
   schema:creator <http://viaf.org/viaf/133297795> ; # Swee-Huay Heng
   schema:datePublished "2010" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/908187073> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/908187073#Series/lecture_notes_in_computer_science> ; # Lecture Notes in Computer Science ;
   schema:name "Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings" ;
   schema:productID "731498707" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/731498707#PublicationEvent/berlin_heidelberg_springer_berlin_heidelberg_2010> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/908187073#Agent/springer_berlin_heidelberg> ; # Springer Berlin Heidelberg
   schema:url <http://dx.doi.org/10.1007/978-3-642-16280-0> ;
   schema:url <http://sfx.metabib.ch:9003/sfx_locater?sid=ALEPH:DSV01&genre=book&isbn=978-3-642-16280-0&id=doi:10.1007/978-3-642-16280-0> ;
   schema:url <http://swbplus.bsz-bw.de/bsz332858510cov.htm> ;
   schema:workExample <http://worldcat.org/isbn/9783642162800> ;
   schema:workExample <http://dx.doi.org/10.1007/978-3-642-16280-0> ;
   schema:workExample <http://worldcat.org/isbn/9783642162794> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/731498707> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/908187073#Agent/springer_berlin_heidelberg> # Springer Berlin Heidelberg
    a bgn:Agent ;
   schema:name "Springer Berlin Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Person/kurosawa_kaoru> # Kaoru Kurosawa
    a schema:Person ;
   schema:familyName "Kurosawa" ;
   schema:givenName "Kaoru" ;
   schema:name "Kaoru Kurosawa" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Place/berlin_heidelberg> # Berlin, Heidelberg
    a schema:Place ;
   schema:name "Berlin, Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Series/lecture_notes_in_computer_science> # Lecture Notes in Computer Science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/731498707> ; # Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings
   schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Topic/algorithm_analysis_and_problem_complexity> # Algorithm Analysis and Problem Complexity
    a schema:Intangible ;
   schema:name "Algorithm Analysis and Problem Complexity" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Topic/coding_and_information_theory> # Coding and Information Theory
    a schema:Intangible ;
   schema:name "Coding and Information Theory" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
   schema:name "Computer Communication Networks" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Topic/information_systems> # Information Systems
    a schema:Intangible ;
   schema:name "Information Systems" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Topic/management_of_computing_and_information_systems> # Management of Computing and Information Systems
    a schema:Intangible ;
   schema:name "Management of Computing and Information Systems" ;
    .

<http://experiment.worldcat.org/entity/work/data/908187073#Topic/systems_and_data_security> # Systems and Data Security
    a schema:Intangible ;
   schema:name "Systems and Data Security" ;
    .

<http://id.loc.gov/authorities/subjects/sh85027654> # Coding theory
    a schema:Intangible ;
   schema:name "Coding theory" ;
    .

<http://id.loc.gov/authorities/subjects/sh85029534> # Computer software
    a schema:Intangible ;
   schema:name "Computer software" ;
    .

<http://id.loc.gov/authorities/subjects/sh85035859> # Data protection
    a schema:Intangible ;
   schema:name "Data protection" ;
    .

<http://id.loc.gov/authorities/subjects/sh89003285> # Computer science
    a schema:Intangible ;
   schema:name "Computer science" ;
    .

<http://id.worldcat.org/fast/866237> # Coding theory
    a schema:Intangible ;
   schema:name "Coding theory" ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
   schema:name "Computer science" ;
    .

<http://id.worldcat.org/fast/872527> # Computer software
    a schema:Intangible ;
   schema:name "Computer software" ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
   schema:name "Data encryption (Computer science)" ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
   schema:name "Data protection" ;
    .

<http://viaf.org/viaf/133297795> # Swee-Huay Heng
    a schema:Person ;
   schema:familyName "Heng" ;
   schema:givenName "Swee-Huay" ;
   schema:name "Swee-Huay Heng" ;
    .

<http://worldcat.org/isbn/9783642162794>
    a schema:ProductModel ;
   schema:isbn "3642162797" ;
   schema:isbn "9783642162794" ;
    .

<http://worldcat.org/isbn/9783642162800>
    a schema:ProductModel ;
   schema:isbn "3642162800" ;
   schema:isbn "9783642162800" ;
    .

<http://www.worldcat.org/title/-/oclc/731498707>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/731498707> ; # Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings
   schema:dateModified "2016-05-10" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.