Provable Security [electronic resource] : First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings / edited by Willy Susilo, Joseph K. Liu, Yi Mu.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- text
- computer
- online resource
- 9783540756705
- Computer science
- Data protection
- Data structures (Computer science)
- Data encryption (Computer science)
- Computers -- Law and legislation
- Electronic commerce
- Computer Science
- Systems and Data Security
- Data Structures, Cryptology and Information Theory
- Data Encryption
- Electronic Commerce/e-business
- Legal Aspects of Computing
- 005.8 23
- QA76.9.A25
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Central Library | Available | E-44731 |
Authentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels -- Asymmetric Encryption -- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks -- Signature -- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function -- Two Notes on the Security of Certificateless Signatures -- A Provably Secure Ring Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use -- Does Secure Time-Stamping Imply Collision-Free Hash Functions? -- Formal Proof of Provable Security by Game-Playing in a Proof Assistant -- Authentication and Symmetric Encryption (Short Papers) -- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication -- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security -- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical Threshold Signatures Without Random Oracles -- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature -- Asymmetric Encryption (Short Papers) -- Formal Security Treatments for Signatures from Identity-Based Encryption -- Decryptable Searchable Encryption.
There are no comments on this title.