04158nam 22008055 450 991048416840332120200702233009.03-319-68637-210.1007/978-3-319-68637-0(CKB)4100000000881959(DE-He213)978-3-319-68637-0(MiAaPQ)EBC6295857(MiAaPQ)EBC5596494(Au-PeEL)EBL5596494(OCoLC)1008567114(PPN)220121346(EXLCZ)99410000000088195920171017d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierProvable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings /edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XIII, 508 p. 37 illus.) Security and Cryptology ;105923-319-68636-4 Secure Cloud Storage and Computing -- Digital Signature and Authentication -- Authenticated Encryption and Key Exchange.- Security Models -- Lattice and Post-Quantum Cryptography -- Public Key Encryption and Signcryption -- Proxy Re-encryption and Functional Encryption -- Protocols.This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.  .Security and Cryptology ;10592Data encryption (Computer science)Computer securityComputers and civilizationApplication softwareManagement information systemsComputer scienceAlgorithmsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Appl. in Administrative Data Processinghttps://scigraph.springernature.com/ontologies/product-market-codes/I2301XManagement of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Data encryption (Computer science).Computer security.Computers and civilization.Application software.Management information systems.Computer science.Algorithms.Cryptology.Systems and Data Security.Computers and Society.Computer Appl. in Administrative Data Processing.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.005.8Okamoto Tatsuakiedthttp://id.loc.gov/vocabulary/relators/edtYu Yongedthttp://id.loc.gov/vocabulary/relators/edtAu Man Hoedthttp://id.loc.gov/vocabulary/relators/edtLi Yannanedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484168403321Provable Security772128UNINA