Normal view MARC view ISBD view

Provable Security [electronic resource] : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings / edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu.

Contributor(s): Takagi, Tsuyoshi [editor.] | Wang, Guilin [editor.] | Qin, Zhiguang [editor.] | Jiang, Shaoquan [editor.] | Yu, Yong [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 7496Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012Edition: 1st ed. 2012.Description: XIII, 337 p. 11 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642332722.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Electronic data processing -- Management | Operating systems (Computers) | Information technology -- Management | Computers and civilization | Cryptology | Data and Information Security | IT Operations | Operating Systems | Computer Application in Administrative Data Processing | Computers and SocietyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
    average rating: 0.0 (0 votes)
No physical items for this record

signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.

This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.

There are no comments for this item.

Log in to your account to post a comment.