Provable Security
Title | Provable Security PDF eBook |
Author | Joonsang Baek |
Publisher | Springer Science & Business Media |
Pages | 370 |
Release | 2008-10-09 |
Genre | Computers |
ISBN | 3540887326 |
This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008. The 25 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, and Applications.
Provable Security
Title | Provable Security PDF eBook |
Author | Willy Susilo |
Publisher | Springer |
Pages | 246 |
Release | 2007-10-06 |
Genre | Computers |
ISBN | 3540756701 |
This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia. The 10 revised full papers presented together with seven short papers were carefully reviewed and selected. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.
Provable Security
Title | Provable Security PDF eBook |
Author | Kaoru Kurosawa |
Publisher | Springer |
Pages | 288 |
Release | 2010-10-09 |
Genre | Computers |
ISBN | 3642162800 |
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption.
Provable Security
Title | Provable Security PDF eBook |
Author | Josef Pawel Pieprzyk |
Publisher | Springer Science & Business Media |
Pages | 285 |
Release | 2009-10-26 |
Genre | Computers |
ISBN | 364204641X |
This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy.
Provable Security
Title | Provable Security PDF eBook |
Author | Liqun Chen |
Publisher | Springer |
Pages | 397 |
Release | 2016-11-03 |
Genre | Computers |
ISBN | 3319474227 |
This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.
Provable Security
Title | Provable Security PDF eBook |
Author | Ron Steinfeld |
Publisher | Springer Nature |
Pages | 385 |
Release | 2019-09-26 |
Genre | Computers |
ISBN | 3030319199 |
This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The 18 full and 6 short papers presented were carefully reviewed and selected from 51 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on “Practical Security.”
Provable Security
Title | Provable Security PDF eBook |
Author | Tatsuaki Okamoto |
Publisher | Springer |
Pages | 508 |
Release | 2017-10-17 |
Genre | Computers |
ISBN | 3319686372 |
This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.