Atjaunināt sīkdatņu piekrišanu

Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings 1st ed. 2016 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 394 pages, height x width: 235x155 mm, weight: 6146 g, 34 Illustrations, black and white; XIII, 394 p. 34 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 10005
  • Izdošanas datums: 13-Oct-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319474219
  • ISBN-13: 9783319474212
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 394 pages, height x width: 235x155 mm, weight: 6146 g, 34 Illustrations, black and white; XIII, 394 p. 34 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 10005
  • Izdošanas datums: 13-Oct-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319474219
  • ISBN-13: 9783319474212
Citas grāmatas par šo tēmu:

This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016.
The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.

Attribute/Role-Based Cryptography
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation
3(16)
Gang Yu
Zhenfu Cao
Guang Zeng
Wenbao Han
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
19(20)
Hui Cui
Robert H. Deng
Guowei Wu
Junzuo Lai
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update
39(22)
Yinhao Jiang
Willy Susilo
Yi Mu
Fuchun Guo
Universally Composable Cryptographic Role-Based Access Control
61(22)
Bin Liu
Bogdan Warinschi
Data in Cloud
ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure
83(18)
Jianhong Zhang
Pengyan Li
Zhibin Sun
Jian Mao
Efficient Dynamic Provable Data Possession from Dynamic Binary Tree
101(11)
Changfeng Li
Huaqun Wang
Identity-Based Batch Provable Data Possession
112(18)
Fucai Zhou
Su Peng
Jian Xu
Zifeng Xu
Secure Naive Bayesian Classification over Encrypted Data in Cloud
130(23)
Xingxin Li
Youwen Zhu
Jian Wang
Searchable Encryption
Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing
153(20)
Fucai Zhou
Yuxi Li
Alex X. Liu
Muqing Lin
Zifeng Xu
Oblivious Keyword Search with Authorization
173(18)
Peng Jiang
Xiaofen Wang
Jianchang Lai
Fuchun Guo
Rongmao Chen
Efficient Asymmetric Index Encapsulation Scheme for Named Data
191(16)
Rong Ma
Zhenfu Cao
Key Management
Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
207(20)
Kazuki Yoneyama
Reo Yoshida
Yuto Kawahara
Tetsutaro Kobayashi
Hitoshi Fuji
Tomohide Yamamoto
One-Round Attribute-Based Key Exchange in the Multi-party Setting
227(17)
Yangguang Tian
Guomin Yang
Yi Mu
Kaitai Liang
Yong Yu
Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message
244(13)
Yong Xie
Libing Wu
Yubo Zhang
Zhiyan Xu
Encryption
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
257(20)
Kazuya Imamura
Kazuhiko Minematsu
Tetsu Iwata
Secure and Efficient Construction of Broadcast Encryption with Dealership
277(19)
Kamalesh Acharya
Ratna Dutta
Towards Certificate-Based Group Encryption
296(13)
Yili Ren
Xiling Luo
Qianhong Wu
Joseph K. Liu
Peng Zhang
Leakage Analysis
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
309(11)
Sujuan Li
Yi Mu
Mingwu Zhang
Futai Zhang
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model
320(20)
Jianye Huang
Qiong Huang
Chunhua Pan
Towards Proofs of Ownership Beyond Bounded Leakage
340(13)
Yongjun Zhao
Sherman S.M. Chow
Homomorphic Encryption
A Homomorphic Proxy Re-encryption from Lattices
353(20)
Chunguang Ma
Juyan Li
Weiping Ouyang
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme
373(11)
Zengpeng Li
Steven D. Galbraith
Chunguang Ma
A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress)
384(9)
Jun Gao
Jiaqi Wang
Ning Lu
Fang Zhu
Wenbo Shi
Author Index 393