Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/777
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Baek, Joonsang. ; | en_US |
dc.contributor.author | Susilo, Willy. ; | en_US |
dc.contributor.author | Kim, Jongkil. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:21:55Z | - |
dc.date.available | 2020-05-17T08:21:55Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783030014469 ; | en_US |
dc.identifier.isbn | 9783030014452 (print) ; | en_US |
dc.identifier.isbn | 9783030014476 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/777 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783030014452. ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783030014476. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications. ; | en_US |
dc.description.statementofresponsibility | edited by Joonsang Baek, Willy Susilo, Jongkil Kim. | en_US |
dc.description.tableofcontents | On the Leakage of Corrupted Garbled Circuits -- Location-Proof System Based on Secure Multi-Party Computations -- Verifiable Homomorphic Secret Sharing -- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security -- Secure Outsourcing of Cryptographic Circuits Manufacturing -- On the Hardness of Learning Parity with Noise over Rings -- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme -- Multivariate Encryption Schemes Based on the Constrained MQ Problem -- Token-Based Multi-Input Functional Encryption -- On the CCA2 Security of McEliece in the Standard Model -- Efficient Attribute-Based Encryption with BlackBox Traceability -- A Code-Based Linkable Ring Signature Scheme -- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature -- Digital Signatures from the Middle-Product LWE -- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation -- A Simpler Construction of Identity-Based Ring Signatures from Lattices -- A Generic Construction of Sequential Aggregate MACs from Any MACs -- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher -- Modeling Privacy in WiFi Fingerprinting Indoor Localization -- Security Notions for Cloud Storage and Deduplication -- Forward Secrecy for SPAKE2 -- User-Mediated Authentication Protocols and Unforgeability for Key Collision -- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing -- Signcryption with Quantum Random Oracles -- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. . ; | en_US |
dc.format.extent | XI, 424 p. 42 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11192. ; | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11192. ; | en_US |
dc.relation.haspart | 9783030014452.pdf | en_US |
dc.subject | Data encryption (Computer scienc. ; | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Computer network architectures. ; | en_US |
dc.subject | Data structures (Computer scienc. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ; | en_US |
dc.subject | Software Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ; | en_US |
dc.subject | Computer Systems Organization and Communication Networks. ; http://scigraph.springernature.com/things/product-market-codes/I13006. ; | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; http://scigraph.springernature.com/things/product-market-codes/I15009. ; | en_US |
dc.subject | Computing Milieux. ; http://scigraph.springernature.com/things/product-market-codes/I24008. ; | en_US |
dc.subject.ddc | 005.82 ; 23 ; | en_US |
dc.title | Provable Security | en_US |
dc.title.alternative | 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783030014452.pdf | 8.51 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Baek, Joonsang. ; | en_US |
dc.contributor.author | Susilo, Willy. ; | en_US |
dc.contributor.author | Kim, Jongkil. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:21:55Z | - |
dc.date.available | 2020-05-17T08:21:55Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783030014469 ; | en_US |
dc.identifier.isbn | 9783030014452 (print) ; | en_US |
dc.identifier.isbn | 9783030014476 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/777 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783030014452. ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783030014476. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications. ; | en_US |
dc.description.statementofresponsibility | edited by Joonsang Baek, Willy Susilo, Jongkil Kim. | en_US |
dc.description.tableofcontents | On the Leakage of Corrupted Garbled Circuits -- Location-Proof System Based on Secure Multi-Party Computations -- Verifiable Homomorphic Secret Sharing -- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security -- Secure Outsourcing of Cryptographic Circuits Manufacturing -- On the Hardness of Learning Parity with Noise over Rings -- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme -- Multivariate Encryption Schemes Based on the Constrained MQ Problem -- Token-Based Multi-Input Functional Encryption -- On the CCA2 Security of McEliece in the Standard Model -- Efficient Attribute-Based Encryption with BlackBox Traceability -- A Code-Based Linkable Ring Signature Scheme -- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature -- Digital Signatures from the Middle-Product LWE -- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation -- A Simpler Construction of Identity-Based Ring Signatures from Lattices -- A Generic Construction of Sequential Aggregate MACs from Any MACs -- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher -- Modeling Privacy in WiFi Fingerprinting Indoor Localization -- Security Notions for Cloud Storage and Deduplication -- Forward Secrecy for SPAKE2 -- User-Mediated Authentication Protocols and Unforgeability for Key Collision -- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing -- Signcryption with Quantum Random Oracles -- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. . ; | en_US |
dc.format.extent | XI, 424 p. 42 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11192. ; | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11192. ; | en_US |
dc.relation.haspart | 9783030014452.pdf | en_US |
dc.subject | Data encryption (Computer scienc. ; | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Computer network architectures. ; | en_US |
dc.subject | Data structures (Computer scienc. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ; | en_US |
dc.subject | Software Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ; | en_US |
dc.subject | Computer Systems Organization and Communication Networks. ; http://scigraph.springernature.com/things/product-market-codes/I13006. ; | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; http://scigraph.springernature.com/things/product-market-codes/I15009. ; | en_US |
dc.subject | Computing Milieux. ; http://scigraph.springernature.com/things/product-market-codes/I24008. ; | en_US |
dc.subject.ddc | 005.82 ; 23 ; | en_US |
dc.title | Provable Security | en_US |
dc.title.alternative | 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783030014452.pdf | 8.51 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Baek, Joonsang. ; | en_US |
dc.contributor.author | Susilo, Willy. ; | en_US |
dc.contributor.author | Kim, Jongkil. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:21:55Z | - |
dc.date.available | 2020-05-17T08:21:55Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783030014469 ; | en_US |
dc.identifier.isbn | 9783030014452 (print) ; | en_US |
dc.identifier.isbn | 9783030014476 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/777 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783030014452. ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783030014476. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications. ; | en_US |
dc.description.statementofresponsibility | edited by Joonsang Baek, Willy Susilo, Jongkil Kim. | en_US |
dc.description.tableofcontents | On the Leakage of Corrupted Garbled Circuits -- Location-Proof System Based on Secure Multi-Party Computations -- Verifiable Homomorphic Secret Sharing -- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security -- Secure Outsourcing of Cryptographic Circuits Manufacturing -- On the Hardness of Learning Parity with Noise over Rings -- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme -- Multivariate Encryption Schemes Based on the Constrained MQ Problem -- Token-Based Multi-Input Functional Encryption -- On the CCA2 Security of McEliece in the Standard Model -- Efficient Attribute-Based Encryption with BlackBox Traceability -- A Code-Based Linkable Ring Signature Scheme -- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature -- Digital Signatures from the Middle-Product LWE -- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation -- A Simpler Construction of Identity-Based Ring Signatures from Lattices -- A Generic Construction of Sequential Aggregate MACs from Any MACs -- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher -- Modeling Privacy in WiFi Fingerprinting Indoor Localization -- Security Notions for Cloud Storage and Deduplication -- Forward Secrecy for SPAKE2 -- User-Mediated Authentication Protocols and Unforgeability for Key Collision -- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing -- Signcryption with Quantum Random Oracles -- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. . ; | en_US |
dc.format.extent | XI, 424 p. 42 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11192. ; | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11192. ; | en_US |
dc.relation.haspart | 9783030014452.pdf | en_US |
dc.subject | Data encryption (Computer scienc. ; | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Computer network architectures. ; | en_US |
dc.subject | Data structures (Computer scienc. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ; | en_US |
dc.subject | Software Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ; | en_US |
dc.subject | Computer Systems Organization and Communication Networks. ; http://scigraph.springernature.com/things/product-market-codes/I13006. ; | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; http://scigraph.springernature.com/things/product-market-codes/I15009. ; | en_US |
dc.subject | Computing Milieux. ; http://scigraph.springernature.com/things/product-market-codes/I24008. ; | en_US |
dc.subject.ddc | 005.82 ; 23 ; | en_US |
dc.title | Provable Security | en_US |
dc.title.alternative | 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783030014452.pdf | 8.51 MB | Adobe PDF | Preview File |