, ,

Provable Security

First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings

Specificaties
Paperback, 246 blz. | Engels
Springer Berlin Heidelberg | 2007e druk, 2007
ISBN13: 9783540756699
Rubricering
Springer Berlin Heidelberg 2007e druk, 2007 9783540756699
Onderdeel van serie Lecture Notes in Computer Science
€ 60,99
Levertijd ongeveer 9 werkdagen
Gratis verzonden

Samenvatting

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia. The 10 revised full papers presented together with seven short papers were carefully reviewed and selected. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Specificaties

ISBN13:9783540756699
Taal:Engels
Bindwijze:paperback
Aantal pagina's:246
Uitgever:Springer Berlin Heidelberg
Druk:2007

Inhoudsopgave

Authentication.- Stronger Security of Authenticated Key Exchange.- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.- Asymmetric Encryption.- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts.- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks.- Signature.- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.- Two Notes on the Security of Certificateless Signatures.- A Provably Secure Ring Signature Scheme in Certificateless Cryptography.- Protocol and Proving Technique.- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use.- Does Secure Time-Stamping Imply Collision-Free Hash Functions?.- Formal Proof of Provable Security by Game-Playing in a Proof Assistant.- Authentication and Symmetric Encryption (Short Papers).- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers.- Signature (Short Papers).- Practical Threshold Signatures Without Random Oracles.- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.- Asymmetric Encryption (Short Papers).- Formal Security Treatments for Signatures from Identity-Based Encryption.- Decryptable Searchable Encryption.
€ 60,99
Levertijd ongeveer 9 werkdagen
Gratis verzonden

Rubrieken

    Personen

      Trefwoorden

        Provable Security