Cantitate/Preț
Produs

Provable Security: First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings: Lecture Notes in Computer Science, cartea 4784

Editat de Willy Susilo, Joseph K. Liu, Yi Mu
en Limba Engleză Paperback – 24 oct 2007

Din seria Lecture Notes in Computer Science

Preț: 33206 lei

Preț vechi: 41508 lei
-20% Nou

Puncte Express: 498

Preț estimativ în valută:
6356 6610$ 5326£

Carte tipărită la comandă

Livrare economică 13-27 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540756699
ISBN-10: 3540756698
Pagini: 254
Ilustrații: X, 246 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.41 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Authentication.- Stronger Security of Authenticated Key Exchange.- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.- Asymmetric Encryption.- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts.- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks.- Signature.- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.- Two Notes on the Security of Certificateless Signatures.- A Provably Secure Ring Signature Scheme in Certificateless Cryptography.- Protocol and Proving Technique.- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use.- Does Secure Time-Stamping Imply Collision-Free Hash Functions?.- Formal Proof of Provable Security by Game-Playing in a Proof Assistant.- Authentication and Symmetric Encryption (Short Papers).- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers.- Signature (Short Papers).- Practical Threshold Signatures Without Random Oracles.- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.- Asymmetric Encryption (Short Papers).- Formal Security Treatments for Signatures from Identity-Based Encryption.- Decryptable Searchable Encryption.