|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465291403316 |
|
|
Titolo |
Provable Security [[electronic resource] ] : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIII, 508 p. 37 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 10592 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer security |
Computers and civilization |
Application software |
Management information systems |
Computer science |
Algorithms |
Cryptology |
Systems and Data Security |
Computers and Society |
Computer Appl. in Administrative Data Processing |
Management of Computing and Information Systems |
Algorithm Analysis and Problem Complexity |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Secure Cloud Storage and Computing -- Digital Signature and Authentication -- Authenticated Encryption and Key Exchange.- Security Models -- Lattice and Post-Quantum Cryptography -- Public Key Encryption and Signcryption -- Proxy Re-encryption and Functional Encryption -- Protocols. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in |
|
|
|
|
|
|
|
|
|
|
Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols. . |
|
|
|
|
|
| |