The Resource Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
Resource Information
The item Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
 Summary

 This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
 This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
 This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
 Language
 eng
 Contents

 On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols  Authenticated Key Exchange Protocols Based on Factoring Assumption  Efficient, PairingFree, Authenticated Identity Based Key Agreement in a Single Round  CIL Security Proof for a PasswordBased Key Exchange  Non Observability in the Random Oracle Model  Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture  InputAware Equivocable Commitments and UCsecure Commitments with Atomic Exchanges  Towards Anonymous Ciphertext Indistinguishability with Identity Leakage  kTime Proxy Signature: Formal Definition and Efficient Construction  Anonymous Signcryption against Linear RelatedKey Attacks  Improved Authenticity Bound of EAX, and Refinements  The Security of the OCB Mode of Operation without the SPRP Assumption  A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes  How to Remove the Exponent GCD in HK09  TranslationRandomizable Distributions via Random Walks  RKA Secure PKE Based on the DDH and HR Assumptions  Computationally Efficient DualPolicy Attribute Based Encryption with Short Ciphertext  FactoringBased Proxy ReEncryption Schemes  Towards a Secure Certificateless Proxy ReEncryption Scheme
 On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols  Authenticated Key Exchange Protocols Based on Factoring Assumption  Efficient, PairingFree, Authenticated Identity Based Key Agreement in a Single Round  CIL Security Proof for a PasswordBased Key Exchange  Non Observability in the Random Oracle Model  Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture  InputAware Equivocable Commitments and UCsecure Commitments with Atomic Exchanges  Towards Anonymous Ciphertext Indistinguishability with Identity Leakage  kTime Proxy Signature: Formal Definition and Efficient Construction  Anonymous Signcryption against Linear RelatedKey Attacks  Improved Authenticity Bound of EAX, and Refinements  The Security of the OCB Mode of Operation without the SPRP Assumption  A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes  How to Remove the Exponent GCD in HK09  TranslationRandomizable Distributions via Random Walks  RKA Secure PKE Based on the DDH and HR Assumptions  Computationally Efficient DualPolicy Attribute Based Encryption with Short Ciphertext  FactoringBased Proxy ReEncryption Schemes  Towards a Secure Certificateless Proxy ReEncryption Scheme
 On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols  Authenticated Key Exchange Protocols Based on Factoring Assumption  Efficient, PairingFree, Authenticated Identity Based Key Agreement in a Single Round  CIL Security Proof for a PasswordBased Key Exchange  Non Observability in the Random Oracle Model  Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture  InputAware Equivocable Commitments and UCsecure Commitments with Atomic Exchanges  Towards Anonymous Ciphertext Indistinguishability with Identity Leakage  kTime Proxy Signature: Formal Definition and Efficient Construction  Anonymous Signcryption against Linear RelatedKey Attacks  Improved Authenticity Bound of EAX, and Refinements  The Security of the OCB Mode of Operation without the SPRP Assumption  A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes  How to Remove the Exponent GCD in HK09  TranslationRandomizable Distributions via Random Walks  RKA Secure PKE Based on the DDH and HR Assumptions  Computationally Efficient DualPolicy Attribute Based Encryption with Short Ciphertext  FactoringBased Proxy ReEncryption Schemes  Towards a Secure Certificateless Proxy ReEncryption Scheme
 Isbn
 9783642412271
 Label
 Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings
 Title
 Provable Security
 Title remainder
 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings
 Statement of responsibility
 edited by Willy Susilo, Reza Reyhanitabar
 Language
 eng
 Summary

 This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
 This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
 This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption
 http://library.link/vocab/creatorName
 Susilo, Willy
 Dewey number
 005.82
 LC call number
 QA76.9.A25
 http://library.link/vocab/relatedWorkOrContributorName

 Reyhanitabar, Reza
 SpringerLink (Online service)
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 8209
 http://library.link/vocab/subjectName

 Computer science
 Data protection
 Data encryption (Computer science)
 Information systems
 Computer Science
 Data Encryption
 Systems and Data Security
 Computers and Society
 eCommerce/ebusiness
 Computer Appl. in Administrative Data Processing
 Computer Science, general
 Label
 Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
 Contents

 On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols  Authenticated Key Exchange Protocols Based on Factoring Assumption  Efficient, PairingFree, Authenticated Identity Based Key Agreement in a Single Round  CIL Security Proof for a PasswordBased Key Exchange  Non Observability in the Random Oracle Model  Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture  InputAware Equivocable Commitments and UCsecure Commitments with Atomic Exchanges  Towards Anonymous Ciphertext Indistinguishability with Identity Leakage  kTime Proxy Signature: Formal Definition and Efficient Construction  Anonymous Signcryption against Linear RelatedKey Attacks  Improved Authenticity Bound of EAX, and Refinements  The Security of the OCB Mode of Operation without the SPRP Assumption  A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes  How to Remove the Exponent GCD in HK09  TranslationRandomizable Distributions via Random Walks  RKA Secure PKE Based on the DDH and HR Assumptions  Computationally Efficient DualPolicy Attribute Based Encryption with Short Ciphertext  FactoringBased Proxy ReEncryption Schemes  Towards a Secure Certificateless Proxy ReEncryption Scheme
 On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols  Authenticated Key Exchange Protocols Based on Factoring Assumption  Efficient, PairingFree, Authenticated Identity Based Key Agreement in a Single Round  CIL Security Proof for a PasswordBased Key Exchange  Non Observability in the Random Oracle Model  Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture  InputAware Equivocable Commitments and UCsecure Commitments with Atomic Exchanges  Towards Anonymous Ciphertext Indistinguishability with Identity Leakage  kTime Proxy Signature: Formal Definition and Efficient Construction  Anonymous Signcryption against Linear RelatedKey Attacks  Improved Authenticity Bound of EAX, and Refinements  The Security of the OCB Mode of Operation without the SPRP Assumption  A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes  How to Remove the Exponent GCD in HK09  TranslationRandomizable Distributions via Random Walks  RKA Secure PKE Based on the DDH and HR Assumptions  Computationally Efficient DualPolicy Attribute Based Encryption with Short Ciphertext  FactoringBased Proxy ReEncryption Schemes  Towards a Secure Certificateless Proxy ReEncryption Scheme
 On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols  Authenticated Key Exchange Protocols Based on Factoring Assumption  Efficient, PairingFree, Authenticated Identity Based Key Agreement in a Single Round  CIL Security Proof for a PasswordBased Key Exchange  Non Observability in the Random Oracle Model  Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture  InputAware Equivocable Commitments and UCsecure Commitments with Atomic Exchanges  Towards Anonymous Ciphertext Indistinguishability with Identity Leakage  kTime Proxy Signature: Formal Definition and Efficient Construction  Anonymous Signcryption against Linear RelatedKey Attacks  Improved Authenticity Bound of EAX, and Refinements  The Security of the OCB Mode of Operation without the SPRP Assumption  A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes  How to Remove the Exponent GCD in HK09  TranslationRandomizable Distributions via Random Walks  RKA Secure PKE Based on the DDH and HR Assumptions  Computationally Efficient DualPolicy Attribute Based Encryption with Short Ciphertext  FactoringBased Proxy ReEncryption Schemes  Towards a Secure Certificateless Proxy ReEncryption Scheme
 Control code
 OCM1bookssj0001049596
 Dimensions
 unknown
 Isbn
 9783642412271
 Other control number
 10.1007/9783642412271
 Specific material designation
 remote
 System control number
 (WaSeSS)bookssj0001049596
 Label
 Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
 Contents

 On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols  Authenticated Key Exchange Protocols Based on Factoring Assumption  Efficient, PairingFree, Authenticated Identity Based Key Agreement in a Single Round  CIL Security Proof for a PasswordBased Key Exchange  Non Observability in the Random Oracle Model  Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture  InputAware Equivocable Commitments and UCsecure Commitments with Atomic Exchanges  Towards Anonymous Ciphertext Indistinguishability with Identity Leakage  kTime Proxy Signature: Formal Definition and Efficient Construction  Anonymous Signcryption against Linear RelatedKey Attacks  Improved Authenticity Bound of EAX, and Refinements  The Security of the OCB Mode of Operation without the SPRP Assumption  A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes  How to Remove the Exponent GCD in HK09  TranslationRandomizable Distributions via Random Walks  RKA Secure PKE Based on the DDH and HR Assumptions  Computationally Efficient DualPolicy Attribute Based Encryption with Short Ciphertext  FactoringBased Proxy ReEncryption Schemes  Towards a Secure Certificateless Proxy ReEncryption Scheme
 On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols  Authenticated Key Exchange Protocols Based on Factoring Assumption  Efficient, PairingFree, Authenticated Identity Based Key Agreement in a Single Round  CIL Security Proof for a PasswordBased Key Exchange  Non Observability in the Random Oracle Model  Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture  InputAware Equivocable Commitments and UCsecure Commitments with Atomic Exchanges  Towards Anonymous Ciphertext Indistinguishability with Identity Leakage  kTime Proxy Signature: Formal Definition and Efficient Construction  Anonymous Signcryption against Linear RelatedKey Attacks  Improved Authenticity Bound of EAX, and Refinements  The Security of the OCB Mode of Operation without the SPRP Assumption  A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes  How to Remove the Exponent GCD in HK09  TranslationRandomizable Distributions via Random Walks  RKA Secure PKE Based on the DDH and HR Assumptions  Computationally Efficient DualPolicy Attribute Based Encryption with Short Ciphertext  FactoringBased Proxy ReEncryption Schemes  Towards a Secure Certificateless Proxy ReEncryption Scheme
 On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols  Authenticated Key Exchange Protocols Based on Factoring Assumption  Efficient, PairingFree, Authenticated Identity Based Key Agreement in a Single Round  CIL Security Proof for a PasswordBased Key Exchange  Non Observability in the Random Oracle Model  Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture  InputAware Equivocable Commitments and UCsecure Commitments with Atomic Exchanges  Towards Anonymous Ciphertext Indistinguishability with Identity Leakage  kTime Proxy Signature: Formal Definition and Efficient Construction  Anonymous Signcryption against Linear RelatedKey Attacks  Improved Authenticity Bound of EAX, and Refinements  The Security of the OCB Mode of Operation without the SPRP Assumption  A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes  How to Remove the Exponent GCD in HK09  TranslationRandomizable Distributions via Random Walks  RKA Secure PKE Based on the DDH and HR Assumptions  Computationally Efficient DualPolicy Attribute Based Encryption with Short Ciphertext  FactoringBased Proxy ReEncryption Schemes  Towards a Secure Certificateless Proxy ReEncryption Scheme
 Control code
 OCM1bookssj0001049596
 Dimensions
 unknown
 Isbn
 9783642412271
 Other control number
 10.1007/9783642412271
 Specific material designation
 remote
 System control number
 (WaSeSS)bookssj0001049596
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.library.mst.edu/portal/ProvableSecurity7thInternationalConference/q9gJwyyL9FM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/ProvableSecurity7thInternationalConference/q9gJwyyL9FM/">Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.library.mst.edu/portal/ProvableSecurity7thInternationalConference/q9gJwyyL9FM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/ProvableSecurity7thInternationalConference/q9gJwyyL9FM/">Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 2325, 2013. Proceedings, edited by Willy Susilo, Reza Reyhanitabar, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>