Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/777
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBaek, Joonsang. ;en_US
dc.contributor.authorSusilo, Willy. ;en_US
dc.contributor.authorKim, Jongkil. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:21:55Z-
dc.date.available2020-05-17T08:21:55Z-
dc.date.issued2018en_US
dc.identifier.isbn9783030014469 ;en_US
dc.identifier.isbn9783030014452 (print) ;en_US
dc.identifier.isbn9783030014476 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/777-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783030014452. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783030014476. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications. ;en_US
dc.description.statementofresponsibilityedited by Joonsang Baek, Willy Susilo, Jongkil Kim.en_US
dc.description.tableofcontentsOn the Leakage of Corrupted Garbled Circuits -- Location-Proof System Based on Secure Multi-Party Computations -- Verifiable Homomorphic Secret Sharing -- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security -- Secure Outsourcing of Cryptographic Circuits Manufacturing -- On the Hardness of Learning Parity with Noise over Rings -- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme -- Multivariate Encryption Schemes Based on the Constrained MQ Problem -- Token-Based Multi-Input Functional Encryption -- On the CCA2 Security of McEliece in the Standard Model -- Efficient Attribute-Based Encryption with BlackBox Traceability -- A Code-Based Linkable Ring Signature Scheme -- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature -- Digital Signatures from the Middle-Product LWE -- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation -- A Simpler Construction of Identity-Based Ring Signatures from Lattices -- A Generic Construction of Sequential Aggregate MACs from Any MACs -- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher -- Modeling Privacy in WiFi Fingerprinting Indoor Localization -- Security Notions for Cloud Storage and Deduplication -- Forward Secrecy for SPAKE2 -- User-Mediated Authentication Protocols and Unforgeability for Key Collision -- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing -- Signcryption with Quantum Random Oracles -- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. . ;en_US
dc.format.extentXI, 424 p. 42 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11192. ;en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11192. ;en_US
dc.relation.haspart9783030014452.pdfen_US
dc.subjectData encryption (Computer scienc. ;en_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer network architectures. ;en_US
dc.subjectData structures (Computer scienc. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ;en_US
dc.subjectSoftware Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ;en_US
dc.subjectComputer Systems Organization and Communication Networks. ; http://scigraph.springernature.com/things/product-market-codes/I13006. ;en_US
dc.subjectData Structures, Cryptology and Information Theory. ; http://scigraph.springernature.com/things/product-market-codes/I15009. ;en_US
dc.subjectComputing Milieux. ; http://scigraph.springernature.com/things/product-market-codes/I24008. ;en_US
dc.subject.ddc005.82 ; 23 ;en_US
dc.titleProvable Securityen_US
dc.title.alternative12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783030014452.pdf8.51 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBaek, Joonsang. ;en_US
dc.contributor.authorSusilo, Willy. ;en_US
dc.contributor.authorKim, Jongkil. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:21:55Z-
dc.date.available2020-05-17T08:21:55Z-
dc.date.issued2018en_US
dc.identifier.isbn9783030014469 ;en_US
dc.identifier.isbn9783030014452 (print) ;en_US
dc.identifier.isbn9783030014476 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/777-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783030014452. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783030014476. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications. ;en_US
dc.description.statementofresponsibilityedited by Joonsang Baek, Willy Susilo, Jongkil Kim.en_US
dc.description.tableofcontentsOn the Leakage of Corrupted Garbled Circuits -- Location-Proof System Based on Secure Multi-Party Computations -- Verifiable Homomorphic Secret Sharing -- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security -- Secure Outsourcing of Cryptographic Circuits Manufacturing -- On the Hardness of Learning Parity with Noise over Rings -- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme -- Multivariate Encryption Schemes Based on the Constrained MQ Problem -- Token-Based Multi-Input Functional Encryption -- On the CCA2 Security of McEliece in the Standard Model -- Efficient Attribute-Based Encryption with BlackBox Traceability -- A Code-Based Linkable Ring Signature Scheme -- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature -- Digital Signatures from the Middle-Product LWE -- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation -- A Simpler Construction of Identity-Based Ring Signatures from Lattices -- A Generic Construction of Sequential Aggregate MACs from Any MACs -- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher -- Modeling Privacy in WiFi Fingerprinting Indoor Localization -- Security Notions for Cloud Storage and Deduplication -- Forward Secrecy for SPAKE2 -- User-Mediated Authentication Protocols and Unforgeability for Key Collision -- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing -- Signcryption with Quantum Random Oracles -- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. . ;en_US
dc.format.extentXI, 424 p. 42 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11192. ;en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11192. ;en_US
dc.relation.haspart9783030014452.pdfen_US
dc.subjectData encryption (Computer scienc. ;en_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer network architectures. ;en_US
dc.subjectData structures (Computer scienc. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ;en_US
dc.subjectSoftware Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ;en_US
dc.subjectComputer Systems Organization and Communication Networks. ; http://scigraph.springernature.com/things/product-market-codes/I13006. ;en_US
dc.subjectData Structures, Cryptology and Information Theory. ; http://scigraph.springernature.com/things/product-market-codes/I15009. ;en_US
dc.subjectComputing Milieux. ; http://scigraph.springernature.com/things/product-market-codes/I24008. ;en_US
dc.subject.ddc005.82 ; 23 ;en_US
dc.titleProvable Securityen_US
dc.title.alternative12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783030014452.pdf8.51 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBaek, Joonsang. ;en_US
dc.contributor.authorSusilo, Willy. ;en_US
dc.contributor.authorKim, Jongkil. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:21:55Z-
dc.date.available2020-05-17T08:21:55Z-
dc.date.issued2018en_US
dc.identifier.isbn9783030014469 ;en_US
dc.identifier.isbn9783030014452 (print) ;en_US
dc.identifier.isbn9783030014476 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/777-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783030014452. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783030014476. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications. ;en_US
dc.description.statementofresponsibilityedited by Joonsang Baek, Willy Susilo, Jongkil Kim.en_US
dc.description.tableofcontentsOn the Leakage of Corrupted Garbled Circuits -- Location-Proof System Based on Secure Multi-Party Computations -- Verifiable Homomorphic Secret Sharing -- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security -- Secure Outsourcing of Cryptographic Circuits Manufacturing -- On the Hardness of Learning Parity with Noise over Rings -- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme -- Multivariate Encryption Schemes Based on the Constrained MQ Problem -- Token-Based Multi-Input Functional Encryption -- On the CCA2 Security of McEliece in the Standard Model -- Efficient Attribute-Based Encryption with BlackBox Traceability -- A Code-Based Linkable Ring Signature Scheme -- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature -- Digital Signatures from the Middle-Product LWE -- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation -- A Simpler Construction of Identity-Based Ring Signatures from Lattices -- A Generic Construction of Sequential Aggregate MACs from Any MACs -- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher -- Modeling Privacy in WiFi Fingerprinting Indoor Localization -- Security Notions for Cloud Storage and Deduplication -- Forward Secrecy for SPAKE2 -- User-Mediated Authentication Protocols and Unforgeability for Key Collision -- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing -- Signcryption with Quantum Random Oracles -- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. . ;en_US
dc.format.extentXI, 424 p. 42 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11192. ;en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11192. ;en_US
dc.relation.haspart9783030014452.pdfen_US
dc.subjectData encryption (Computer scienc. ;en_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer network architectures. ;en_US
dc.subjectData structures (Computer scienc. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ;en_US
dc.subjectSoftware Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ;en_US
dc.subjectComputer Systems Organization and Communication Networks. ; http://scigraph.springernature.com/things/product-market-codes/I13006. ;en_US
dc.subjectData Structures, Cryptology and Information Theory. ; http://scigraph.springernature.com/things/product-market-codes/I15009. ;en_US
dc.subjectComputing Milieux. ; http://scigraph.springernature.com/things/product-market-codes/I24008. ;en_US
dc.subject.ddc005.82 ; 23 ;en_US
dc.titleProvable Securityen_US
dc.title.alternative12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783030014452.pdf8.51 MBAdobe PDFThumbnail
Preview File