03813nam 22007935 450 99646529970331620200803191739.03-319-47422-710.1007/978-3-319-47422-9(CKB)3710000000926177(DE-He213)978-3-319-47422-9(MiAaPQ)EBC6302303(MiAaPQ)EBC5579255(Au-PeEL)EBL5579255(OCoLC)1066181136(PPN)197136818(EXLCZ)99371000000092617720161012d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierProvable Security[electronic resource] 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings /edited by Liqun Chen, Jinguang Han1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XIII, 394 p. 34 illus.) Security and Cryptology ;100053-319-47421-9 Includes bibliographical references and index.Attribute/Role-based Cryptography -- Data in Cloud -- Searchable Encryption -- Key Management -- Encryption -- Leakage Analysis -- Homomorphic Encryption.This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.Security and Cryptology ;10005Data encryption (Computer science)Computer securityComputers and civilizationApplication softwareManagement information systemsComputer scienceAlgorithmsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Appl. in Administrative Data Processinghttps://scigraph.springernature.com/ontologies/product-market-codes/I2301XManagement of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Data encryption (Computer science).Computer security.Computers and civilization.Application software.Management information systems.Computer science.Algorithms.Cryptology.Systems and Data Security.Computers and Society.Computer Appl. in Administrative Data Processing.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.005.8Chen Liqunedthttp://id.loc.gov/vocabulary/relators/edtHan Jinguangedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465299703316Provable Security772128UNISA