Buch, Englisch, 246 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 397 g
Reihe: Security and Cryptology
First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings
Buch, Englisch, 246 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 397 g
Reihe: Security and Cryptology
ISBN: 978-3-540-75669-9
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Rechtliche Aspekte der EDV
Weitere Infos & Material
Authentication.- Stronger Security of Authenticated Key Exchange.- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.- Asymmetric Encryption.- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts.- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks.- Signature.- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.- Two Notes on the Security of Certificateless Signatures.- A Provably Secure Ring Signature Scheme in Certificateless Cryptography.- Protocol and Proving Technique.- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use.- Does Secure Time-Stamping Imply Collision-Free Hash Functions?.- Formal Proof of Provable Security by Game-Playing in a Proof Assistant.- Authentication and Symmetric Encryption (Short Papers).- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers.- Signature (Short Papers).- Practical Threshold Signatures Without Random Oracles.- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.- Asymmetric Encryption (Short Papers).- Formal Security Treatments for Signatures from Identity-Based Encryption.- Decryptable Searchable Encryption.