000 03876nam a22006615i 4500
001 978-3-540-75670-5
003 DE-He213
005 20240423125605.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540756705
_9978-3-540-75670-5
024 7 _a10.1007/978-3-540-75670-5
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aProvable Security
_h[electronic resource] :
_bFirst International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings /
_cedited by Willy Susilo, Joseph K. Liu, Yi Mu.
250 _a1st ed. 2007.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2007.
300 _aX, 246 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4784
505 0 _aAuthentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels -- Asymmetric Encryption -- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks -- Signature -- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function -- Two Notes on the Security of Certificateless Signatures -- A Provably Secure Ring Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use -- Does Secure Time-Stamping Imply Collision-Free Hash Functions? -- Formal Proof of Provable Security by Game-Playing in a Proof Assistant -- Authentication and Symmetric Encryption (Short Papers) -- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication -- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security -- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical Threshold Signatures Without Random Oracles -- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature -- Asymmetric Encryption (Short Papers) -- Formal Security Treatments for Signatures from Identity-Based Encryption -- Decryptable Searchable Encryption.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aInformation theory.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aElectronic commerce.
650 0 _aComputers
_xLaw and legislation.
650 0 _aInformation technology
_xLaw and legislation.
650 1 4 _aData and Information Security.
650 2 4 _aData Structures and Information Theory.
650 2 4 _aCryptology.
650 2 4 _ae-Commerce and e-Business.
650 2 4 _aLegal Aspects of Computing.
700 1 _aSusilo, Willy.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLiu, Joseph K.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMu, Yi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540756699
776 0 8 _iPrinted edition:
_z9783540845003
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4784
856 4 0 _uhttps://doi.org/10.1007/978-3-540-75670-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c179624
_d179624