04089nam 22008295 450 99646576780331620200630020539.03-642-33272-210.1007/978-3-642-33272-2(CKB)3400000000085783(SSID)ssj0000746100(PQKBManifestationID)11410831(PQKBTitleCode)TC0000746100(PQKBWorkID)10860145(PQKB)10172959(DE-He213)978-3-642-33272-2(MiAaPQ)EBC3070877(PPN)168323990(EXLCZ)99340000000008578320120822d2012 u| 0engurnn|008mamaatxtccrProvable Security[electronic resource] 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings /edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu1st ed. 2012.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2012.1 online resource (XIII, 337 p. 11 illus.)Security and Cryptology ;7496International conference proceedings.3-642-33271-4 Includes bibliographical references and author index.signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.Security and Cryptology ;7496Data encryption (Computer science)Computer securityManagement information systemsComputer scienceOperating systems (Computers)Application softwareComputers and civilizationCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computer Appl. in Administrative Data Processinghttps://scigraph.springernature.com/ontologies/product-market-codes/I2301XComputers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Data encryption (Computer science).Computer security.Management information systems.Computer science.Operating systems (Computers).Application software.Computers and civilization.Cryptology.Systems and Data Security.Management of Computing and Information Systems.Operating Systems.Computer Appl. in Administrative Data Processing.Computers and Society.005.8Takagi Tsuyoshiedthttp://id.loc.gov/vocabulary/relators/edtWang Guilinedthttp://id.loc.gov/vocabulary/relators/edtQin Zhiguangedthttp://id.loc.gov/vocabulary/relators/edtJiang Shaoquanedthttp://id.loc.gov/vocabulary/relators/edtYu Yongedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465767803316Provable Security772128UNISA