Atjaunināt sīkdatņu piekrišanu

Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings 2008 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 361 pages, height x width: 235x155 mm, weight: 575 g, XI, 361 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 5324
  • Izdošanas datums: 09-Oct-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540887326
  • ISBN-13: 9783540887324
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 361 pages, height x width: 235x155 mm, weight: 575 g, XI, 361 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 5324
  • Izdošanas datums: 09-Oct-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540887326
  • ISBN-13: 9783540887324
This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008. The 25 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, and Applications.
Encryption.- Generalized ElGamal Public Key Cryptosystem Based on a New
Diffie-Hellman Problem.- Tweakable Pseudorandom Permutation from Generalized
Feistel Structure.- Timed-Release Encryption Revisited.- Efficient and
Provably Secure Certificateless Multi-receiver Signcryption.- A CCA Secure
Hybrid Damgårds ElGamal Encryption.- Signature.- Construction of Yet Another
Forward Secure Signature Scheme Using Bilinear Maps.- Optimal Online/Offline
Signature: How to Sign a Message without Online Computation.- Round-Optimal
Blind Signatures from Waters Signatures.- Secure Proxy Multi-signature Scheme
in the Standard Model.- Server-Aided Verification Signatures: Definitions and
New Constructions.- Analysis.- On Proofs of Security for DAA Schemes.-
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.-
Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal
Setups.- On the Equivalence of Generic Group Models.- The Analysis of an
Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its
Secure Version.- Application of Hash Functions.- Leaky Random Oracle
(Extended Abstract).- How to Use Merkle-Damgård On the Security Relations
between Signature Schemes and Their Inner Hash Functions.- Can We Construct
Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?.-
Universal Composability.- Relationship of Three Cryptographic Channels in the
UC Framework.- A Universally Composable Framework for the Analysis of
Browser-Based Security Protocols.- Threshold Homomorphic Encryption in the
Universally Composable Cryptographic Library.- Universally Composable
Security Analysis of TLS.- Round Optimal Universally Composable Oblivious
Transfer Protocols.- Applications.- A Tamper-Evident Voting Machine Resistant
to CovertChannels.- Self-healing Key Distribution with Revocation and
Resistance to the Collusion Attack in Wireless Sensor Networks.