Provable Security (Record no. 96671)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05468nam a22006615i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-12475-9 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730201717.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 141001s2014 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783319124759 |
-- | 978-3-319-12475-9 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-319-12475-9 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Provable Security |
Medium | [electronic resource] : |
Remainder of title | 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings / |
Statement of responsibility, etc. | edited by Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2014. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cham : |
Name of producer, publisher, distributor, manufacturer | Springer International Publishing : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2014. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XVIII, 351 p. 41 illus. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 8782 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Invited Paper -- Password-Based Authenticated Key Exchange: An Overview -- Practical and Provably Secure Attribute Based Encryption -- Fundamental -- Adaptive versus Static Security in the UC Model -- Impossibility of Surjective Icart-Like Encodings -- Symmetric Key Encryption -- On the practical security bound of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode -- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function -- Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme -- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags -- Signatures -- Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable Computation in Multiparty Protocols with Honest Majority -- Public Key Encryption -- Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security -- Fine-grained Conditional Proxy Re-encryption and Application -- Predicate Encryption -- Constructing Subspace Membership Encryption through Inner Product Encryption -- Efficient (Anonymous) Compact HIBE From Standard Assumptions -- Attribute-based Cryptosystem -- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts -- Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack -- Short Papers -- How to Use Pseudorandom Generators in Unconditional Security Settings -- Equivalence between MAC and PRF for Blockcipher based Constructions -- A Short Fail-Stop Signature Scheme from Factoring -- Computational Soundness of Asymmetric Bilinear Pairing-based Protocols -- Timed-Release Computational Secret Sharing Scheme and Its Applications -- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage -- Complete Robustness in Identity-Based Encryption. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
9 (RLIN) | 1973 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science). |
9 (RLIN) | 9168 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
9 (RLIN) | 7245 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and civilization. |
9 (RLIN) | 21733 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information technology |
General subdivision | Management. |
9 (RLIN) | 5368 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Electronic data processing |
General subdivision | Management. |
9 (RLIN) | 168399 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptology. |
9 (RLIN) | 31769 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data and Information Security. |
9 (RLIN) | 31990 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and Society. |
9 (RLIN) | 31668 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Application in Administrative Data Processing. |
9 (RLIN) | 31588 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | IT Operations. |
9 (RLIN) | 31703 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chow, Sherman S.M. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 168400 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Liu, Joseph K. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 168401 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Hui, Lucas C.K. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 168402 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Yiu, Siu Ming. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 168403 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 168404 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783319124742 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783319124766 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 8782 |
9 (RLIN) | 168405 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.