Get Free Shipping on orders over $79
Provable Security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings - Sherman S.M. Chow

Provable Security

8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings

By: Sherman S.M. Chow (Editor), Joseph K. Liu (Editor), Lucas C.K. Hui (Editor)

Paperback | 8 October 2014

At a Glance

Paperback


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

Invited Paper.- Password-Based Authenticated Key Exchange: An Overview.- Practical and Provably Secure Attribute Based Encryption.- Fundamental.- Adaptive versus Static Security in the UC Model.- Impossibility of Surjective Icart-Like Encodings.- Symmetric Key Encryption.- On the practical security bound of GF-NLFSR structure with SPN round function.- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode.- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function.- Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme.- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.- Signatures.- Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency.- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures.- Protocol.- Verifiable Computation in Multiparty Protocols with Honest Majority.- Public Key Encryption.- Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions.- Proxy Re-Encryption.- RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security.- Fine-grained Conditional Proxy Re-encryption and Application.- Predicate Encryption.- Constructing Subspace Membership Encryption through Inner Product Encryption.- Efficient (Anonymous) Compact HIBE From Standard Assumptions.- Attribute-based Cryptosystem.- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.- Attribute-Based Signcryption: Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack.- Short Papers.- How to Use Pseudorandom Generators in Unconditional Security Settings.- Equivalence between MAC and PRF for Blockcipher based Constructions.- A Short Fail-Stop Signature Scheme from Factoring.- Computational Soundness of Asymmetric Bilinear Pairing-based Protocols.- Timed-Release Computational Secret Sharing Scheme and Its Applications.- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage.- Complete Robustness in Identity-Based Encryption.

More in Data Encryption

Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Blockchain : Blueprint for a New Economy - Melanie Swa

RRP $66.75

$30.99

54%
OFF
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF
Hackers & Painters - Paul Graham

RRP $47.75

$26.75

44%
OFF
Linux Security Cookbook : Cookbooks Ser. - Daniel J Barrett

RRP $76.00

$39.75

48%
OFF
Mastering Ethereum : Building Smart Contracts and Dapps - Andreas Antonopoulos