Muutke küpsiste eelistusi

E-raamat: Provable Security: Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings

Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 5848
  • Ilmumisaeg: 09-Nov-2009
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642046421
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 5848
  • Ilmumisaeg: 09-Nov-2009
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642046421

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The third International Conference on Provable Security (ProvSec 2009) was held in Guangzhou, China, November 11-13, 2009. It continued the theme of ProvableSecurity initiated by the ProvSec2007 conference in Wollongong, A- tralia. The second ProvSec conference was organized in Shanghai, China. The conference was sponsored by the Center for Advanced Computing Cryptog- phy and Algorithms (ACAC), Macquarie University, Australia; Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, China; andthe NationalNaturalScienceFoundationofChina (NSFC).JiwuHuangwas the General Chair and we, Josef Pieprzyk and Fangguo Zhang, were Program Co-chairs. The conference proceedings have been published by Springer in this volume of Lecture Notes in Computer Science. The Program Committee invited two distinguished researchers to deliver their keynote talks. The ?rst speaker was Alex Dent from Royal Holloway, University of London. His talk was entitled A Brief History of Se

curity Models for Con dentiality . The second speaker was Bogdan Warinschi from the University of Bristol, UK, who presented a talk on Symbolic Methods for Provable Security . We received 64 papers. Each paper was assigned to three referees. Papers submitted by the members of the Program Committee were assigned to ?ve referees. In the ?rst stage of the review process, the submitted papers were readand evaluated bythe PCmembers and then in the secondstage,the papers werescrutinizedduringanextensivediscussion.Finally,theProgramCommittee chose 19 papers to be included in the conference program. The authors of the accepted papers had three weeks for revision and preparation of ?nal versions.

Invited Talks.- A Brief History of Security Models for Confidentiality.- Symbolic Methods for Provable Security.- Encryption.- Efficient Non-interactive Universally Composable String-Commitment Schemes.- Spatial Encryption under Simpler Assumption.- Chosen-Ciphertext Secure RSA-Type Cryptosystems.- Anonymous Conditional Proxy Re-encryption without Random Oracle.- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.- Digital Signatures.- Identity-Based Verifiably Encrypted Signatures without Random Oracles.- How to Prove Security of a Signature with a Tighter Security Reduction.- Twin Signature Schemes, Revisited.- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions.- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures .- Anonymous Signatures Revisited.- Cryptographic Protocols.- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles.- Password Authenticated Key Exchange Based on

RSA in the Three-Party Settings.- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols.- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge.- Server-Controlled Identity-Based Authenticated Key Exchange.- Reductions and Privacy.- Oracle Separation in the Non-uniform Model.- GUC-Secure Set-Intersection Computation.- Self-enforcing Private Inference Control.
Invited Talks.- A Brief History of Security Models for Confidentiality.-
Symbolic Methods for Provable Security.- Encryption.- Efficient
Non-interactive Universally Composable String-Commitment Schemes.- Spatial
Encryption under Simpler Assumption.- Chosen-Ciphertext Secure RSA-Type
Cryptosystems.- Anonymous Conditional Proxy Re-encryption without Random
Oracle.- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.-
Digital Signatures.- Identity-Based Verifiably Encrypted Signatures without
Random Oracles.- How to Prove Security of a Signature with a Tighter Security
Reduction.- Twin Signature Schemes, Revisited.- On the Insecurity of the
Fiat-Shamir Signatures with Iterative Hash Functions.- Is the Notion of
Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line
Signatures?.- Anonymous Signatures Revisited.- Cryptographic Protocols.- An
eCK-Secure Authenticated Key Exchange Protocol without Random Oracles.-
Password Authenticated Key Exchange Based on RSA in the Three-Party
Settings.- Comparing SessionStateReveal and EphemeralKeyReveal for
Diffie-Hellman Protocols.- Zero-Knowledge Protocols for NTRU: Application to
Identification and Proof of Plaintext Knowledge.- Server-Controlled
Identity-Based Authenticated Key Exchange.- Reductions and Privacy.- Oracle
Separation in the Non-uniform Model.- GUC-Secure Set-Intersection
Computation.- Self-enforcing Private Inference Control.