The Resource Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
Resource Information
The item Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
-
- This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
- This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
- This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
- Language
- eng
- Contents
-
- On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme
- On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme
- On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme
- Isbn
- 9783642412271
- Label
- Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings
- Title
- Provable Security
- Title remainder
- 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings
- Statement of responsibility
- edited by Willy Susilo, Reza Reyhanitabar
- Language
- eng
- Summary
-
- This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
- This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
- This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
- http://library.link/vocab/creatorName
- Susilo, Willy
- Dewey number
- 005.82
- LC call number
- QA76.9.A25
- http://library.link/vocab/relatedWorkOrContributorName
-
- Reyhanitabar, Reza
- SpringerLink (Online service)
- Series statement
- Lecture Notes in Computer Science,
- Series volume
- 8209
- http://library.link/vocab/subjectName
-
- Computer science
- Data protection
- Data encryption (Computer science)
- Information systems
- Computer Science
- Data Encryption
- Systems and Data Security
- Computers and Society
- e-Commerce/e-business
- Computer Appl. in Administrative Data Processing
- Computer Science, general
- Label
- Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
- Contents
-
- On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme
- On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme
- On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme
- Control code
- OCM1bookssj0001049596
- Dimensions
- unknown
- Isbn
- 9783642412271
- Other control number
- 10.1007/978-3-642-41227-1
- Specific material designation
- remote
- System control number
- (WaSeSS)bookssj0001049596
- Label
- Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
- Contents
-
- On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme
- On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme
- On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme
- Control code
- OCM1bookssj0001049596
- Dimensions
- unknown
- Isbn
- 9783642412271
- Other control number
- 10.1007/978-3-642-41227-1
- Specific material designation
- remote
- System control number
- (WaSeSS)bookssj0001049596
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Provable-Security--7th-International-Conference/q9gJwyyL9FM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Provable-Security--7th-International-Conference/q9gJwyyL9FM/">Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Provable-Security--7th-International-Conference/q9gJwyyL9FM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Provable-Security--7th-International-Conference/q9gJwyyL9FM/">Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>