Atjaunināt sīkdatņu piekrišanu

E-grāmata: Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 10005
  • Izdošanas datums: 03-Nov-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319474229
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 10005
  • Izdošanas datums: 03-Nov-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319474229

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016.
The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.

Attribute/Role-Based Cryptography
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation
3(16)
Gang Yu
Zhenfu Cao
Guang Zeng
Wenbao Han
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
19(20)
Hui Cui
Robert H. Deng
Guowei Wu
Junzuo Lai
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update
39(22)
Yinhao Jiang
Willy Susilo
Yi Mu
Fuchun Guo
Universally Composable Cryptographic Role-Based Access Control
61(22)
Bin Liu
Bogdan Warinschi
Data in Cloud
ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure
83(18)
Jianhong Zhang
Pengyan Li
Zhibin Sun
Jian Mao
Efficient Dynamic Provable Data Possession from Dynamic Binary Tree
101(11)
Changfeng Li
Huaqun Wang
Identity-Based Batch Provable Data Possession
112(18)
Fucai Zhou
Su Peng
Jian Xu
Zifeng Xu
Secure Naive Bayesian Classification over Encrypted Data in Cloud
130(23)
Xingxin Li
Youwen Zhu
Jian Wang
Searchable Encryption
Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing
153(20)
Fucai Zhou
Yuxi Li
Alex X. Liu
Muqing Lin
Zifeng Xu
Oblivious Keyword Search with Authorization
173(18)
Peng Jiang
Xiaofen Wang
Jianchang Lai
Fuchun Guo
Rongmao Chen
Efficient Asymmetric Index Encapsulation Scheme for Named Data
191(16)
Rong Ma
Zhenfu Cao
Key Management
Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
207(20)
Kazuki Yoneyama
Reo Yoshida
Yuto Kawahara
Tetsutaro Kobayashi
Hitoshi Fuji
Tomohide Yamamoto
One-Round Attribute-Based Key Exchange in the Multi-party Setting
227(17)
Yangguang Tian
Guomin Yang
Yi Mu
Kaitai Liang
Yong Yu
Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message
244(13)
Yong Xie
Libing Wu
Yubo Zhang
Zhiyan Xu
Encryption
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
257(20)
Kazuya Imamura
Kazuhiko Minematsu
Tetsu Iwata
Secure and Efficient Construction of Broadcast Encryption with Dealership
277(19)
Kamalesh Acharya
Ratna Dutta
Towards Certificate-Based Group Encryption
296(13)
Yili Ren
Xiling Luo
Qianhong Wu
Joseph K. Liu
Peng Zhang
Leakage Analysis
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
309(11)
Sujuan Li
Yi Mu
Mingwu Zhang
Futai Zhang
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model
320(20)
Jianye Huang
Qiong Huang
Chunhua Pan
Towards Proofs of Ownership Beyond Bounded Leakage
340(13)
Yongjun Zhao
Sherman S.M. Chow
Homomorphic Encryption
A Homomorphic Proxy Re-encryption from Lattices
353(20)
Chunguang Ma
Juyan Li
Weiping Ouyang
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme
373(11)
Zengpeng Li
Steven D. Galbraith
Chunguang Ma
A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress)
384(9)
Jun Gao
Jiaqi Wang
Ning Lu
Fang Zhu
Wenbo Shi
Author Index 393