Provable Security [electronic resource] : 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings / edited by Man-Ho Au, Atsuko Miyaji.
Contributor(s): Au, Man-Ho [editor.] | Miyaji, Atsuko [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 9451Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XIX, 504 p. 65 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319260594.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Computers and civilization | Information technology -- Management | Electronic data processing -- Management | Cryptology | Data and Information Security | Computers and Society | Computer Application in Administrative Data Processing | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.No physical items for this record
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.
There are no comments for this item.