Provable security : first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings / Willy Susilo, Joseph K. Liu, Yi Mu (eds.).
Contributor(s): Susilo, Willy | Liu, Joseph K | Mu, Yi.Material type: TextSeries: Springer.Lecture notes in computer science: 4784.; LNCS sublibrarySL 4Security and cryptology: Publisher: Berlin ; New York : Springer, c2007Description: 1 online resource (x, 236 p.) : ill.ISBN: 9783540756705; 3540756701; 9783540756699; 3540756698; 6611354670; 9786611354671.Other title: ProvSec 2007.Subject(s): Computer security -- Congresses | Computer systems -- Access control -- Congresses | Cryptography -- CongressesAdditional physical formats: Print version:: Provable security.LOC classification: QA76.9.A25 | P787 2007Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9.A25 P787 2007 (Browse shelf)||http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/978-3-540-75670-5||Available||ocn191470454|
Includes bibliographical references and index.
Front Matter; Stronger Security of Authenticated Key Exchange; An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels; CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts; Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks; A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function; Two Notes on the Security of Certificateless Signatures; A Provably Secure Ring Signature Scheme in Certificateless Cryptography; Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use.
This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007. The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.
Description based on print version record.