LEADER 01524nam--2200445---450- 001 990003310620203316 005 20091006154441.0 010 $a978-90-5201-470-8 035 $a000331062 035 $aUSA01000331062 035 $a(ALEPH)000331062USA01 035 $a000331062 100 $a20090915d2008----km-y0itay50------ba 101 $afre 102 $aBE 105 $a||||||||001yy 200 1 $aMemoires et antimemoires litteraires au 20. siecle$ela premiere guerre mondiale$eColloque de Cerisy-la-Salle 2005$fAnnamaria Laserra, Nicole Leclerq et Marc Quaghebeur (dir.) 210 $aParis$cPeter Lang$dcopyr. 2008 215 $av.$d22 cm 225 2 $aDocuments pour l'histoire des francophonies. Theorie$v15 327 1 $a<> : 426 p. ; >>Vol. 2.>> : 339 p. 410 0$12001$aDocuments pour l'histoire des francophonies. Theorie 454 1$12001 461 1$1001-------$12001 606 $aLetteratura francese$xAtti di congressi$xTemi [:] Guerra mondiale$z1914-1918 676 $a840.9358 702 1$aLASERRA,$bAnnamaria 702 $aLECLERCQ,$bNicole 702 $aQUAGHEBEUR,$bMarc 801 0$aIT$bsalbc$gISBD 912 $a990003310620203316 951 $aII.$b9321 DSLL 951 $aII.$b9330 DSLL 959 $aBK 969 $aDSLL 979 $aDSLL$b90$c20090915$lUSA01$h1028 979 $aDSLL$b90$c20091006$lUSA01$h1543 979 $aDSLL$b90$c20091006$lUSA01$h1544 996 $aMémoires et antimémoires littéraires au 20. siècle$91011937 997 $aUNISA LEADER 04787nam 22008895 450 001 9910483360103321 005 20251226203739.0 010 $a3-540-75670-1 024 7 $a10.1007/978-3-540-75670-5 035 $a(CKB)1000000000490900 035 $a(SSID)ssj0000319650 035 $a(PQKBManifestationID)11277225 035 $a(PQKBTitleCode)TC0000319650 035 $a(PQKBWorkID)10354526 035 $a(PQKB)10461766 035 $a(DE-He213)978-3-540-75670-5 035 $a(MiAaPQ)EBC336870 035 $a(MiAaPQ)EBC4976741 035 $a(MiAaPQ)EBC6426757 035 $a(Au-PeEL)EBL336870 035 $a(OCoLC)191470454 035 $a(PPN)123728657 035 $a(MiAaPQ)EBC5610788 035 $a(EXLCZ)991000000000490900 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProvable Security $eFirst International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings /$fedited by Willy Susilo, Joseph K. Liu, Yi Mu 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (X, 246 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4784 300 $aIncludes index. 311 08$a3-540-75669-8 327 $aAuthentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels -- Asymmetric Encryption -- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks -- Signature -- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function -- Two Notes on the Security of Certificateless Signatures -- A Provably Secure Ring Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use -- Does Secure Time-Stamping Imply Collision-Free Hash Functions? -- Formal Proof of Provable Security by Game-Playing in a Proof Assistant -- Authentication and Symmetric Encryption (Short Papers) -- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication -- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security -- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical Threshold Signatures Without Random Oracles -- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature -- Asymmetric Encryption (Short Papers) -- Formal Security Treatments for Signatures from Identity-Based Encryption -- Decryptable Searchable Encryption. 330 $aThis book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007. The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4784 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic commerce 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aData and Information Security 606 $aData Structures and Information Theory 606 $aCryptology 606 $ae-Commerce and e-Business 606 $aLegal Aspects of Computing 615 0$aData protection. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic commerce. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 14$aData and Information Security. 615 24$aData Structures and Information Theory. 615 24$aCryptology. 615 24$ae-Commerce and e-Business. 615 24$aLegal Aspects of Computing. 676 $a005.8 702 $aMu$b Yi$f1955- 702 $aSusilo$b Willy 702 $aLiu$b Joseph K. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483360103321 996 $aProvable Security$9772128 997 $aUNINA