Atjaunināt sīkdatņu piekrišanu

E-grāmata: Provable Security: Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 5848
  • Izdošanas datums: 09-Nov-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642046421
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 5848
  • Izdošanas datums: 09-Nov-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642046421

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The third International Conference on Provable Security (ProvSec 2009) was held in Guangzhou, China, November 11-13, 2009. It continued the theme of ProvableSecurity initiated by the ProvSec2007 conference in Wollongong, A- tralia. The second ProvSec conference was organized in Shanghai, China. The conference was sponsored by the Center for Advanced Computing Cryptog- phy and Algorithms (ACAC), Macquarie University, Australia; Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, China; andthe NationalNaturalScienceFoundationofChina (NSFC).JiwuHuangwas the General Chair and we, Josef Pieprzyk and Fangguo Zhang, were Program Co-chairs. The conference proceedings have been published by Springer in this volume of Lecture Notes in Computer Science. The Program Committee invited two distinguished researchers to deliver their keynote talks. The ?rst speaker was Alex Dent from Royal Holloway, University of London. His talk was entitled A Brief History of Se

curity Models for Con dentiality . The second speaker was Bogdan Warinschi from the University of Bristol, UK, who presented a talk on Symbolic Methods for Provable Security . We received 64 papers. Each paper was assigned to three referees. Papers submitted by the members of the Program Committee were assigned to ?ve referees. In the ?rst stage of the review process, the submitted papers were readand evaluated bythe PCmembers and then in the secondstage,the papers werescrutinizedduringanextensivediscussion.Finally,theProgramCommittee chose 19 papers to be included in the conference program. The authors of the accepted papers had three weeks for revision and preparation of ?nal versions.

Invited Talks.- A Brief History of Security Models for Confidentiality.- Symbolic Methods for Provable Security.- Encryption.- Efficient Non-interactive Universally Composable String-Commitment Schemes.- Spatial Encryption under Simpler Assumption.- Chosen-Ciphertext Secure RSA-Type Cryptosystems.- Anonymous Conditional Proxy Re-encryption without Random Oracle.- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.- Digital Signatures.- Identity-Based Verifiably Encrypted Signatures without Random Oracles.- How to Prove Security of a Signature with a Tighter Security Reduction.- Twin Signature Schemes, Revisited.- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions.- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures .- Anonymous Signatures Revisited.- Cryptographic Protocols.- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles.- Password Authenticated Key Exchange Based on

RSA in the Three-Party Settings.- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols.- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge.- Server-Controlled Identity-Based Authenticated Key Exchange.- Reductions and Privacy.- Oracle Separation in the Non-uniform Model.- GUC-Secure Set-Intersection Computation.- Self-enforcing Private Inference Control.
Invited Talks.- A Brief History of Security Models for Confidentiality.-
Symbolic Methods for Provable Security.- Encryption.- Efficient
Non-interactive Universally Composable String-Commitment Schemes.- Spatial
Encryption under Simpler Assumption.- Chosen-Ciphertext Secure RSA-Type
Cryptosystems.- Anonymous Conditional Proxy Re-encryption without Random
Oracle.- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.-
Digital Signatures.- Identity-Based Verifiably Encrypted Signatures without
Random Oracles.- How to Prove Security of a Signature with a Tighter Security
Reduction.- Twin Signature Schemes, Revisited.- On the Insecurity of the
Fiat-Shamir Signatures with Iterative Hash Functions.- Is the Notion of
Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line
Signatures?.- Anonymous Signatures Revisited.- Cryptographic Protocols.- An
eCK-Secure Authenticated Key Exchange Protocol without Random Oracles.-
Password Authenticated Key Exchange Based on RSA in the Three-Party
Settings.- Comparing SessionStateReveal and EphemeralKeyReveal for
Diffie-Hellman Protocols.- Zero-Knowledge Protocols for NTRU: Application to
Identification and Proof of Plaintext Knowledge.- Server-Controlled
Identity-Based Authenticated Key Exchange.- Reductions and Privacy.- Oracle
Separation in the Non-uniform Model.- GUC-Secure Set-Intersection
Computation.- Self-enforcing Private Inference Control.