LEADER 04089nam 22008295 450 001 996465767803316 005 20200630020539.0 010 $a3-642-33272-2 024 7 $a10.1007/978-3-642-33272-2 035 $a(CKB)3400000000085783 035 $a(SSID)ssj0000746100 035 $a(PQKBManifestationID)11410831 035 $a(PQKBTitleCode)TC0000746100 035 $a(PQKBWorkID)10860145 035 $a(PQKB)10172959 035 $a(DE-He213)978-3-642-33272-2 035 $a(MiAaPQ)EBC3070877 035 $a(PPN)168323990 035 $a(EXLCZ)993400000000085783 100 $a20120822d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProvable Security$b[electronic resource] $e6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings /$fedited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIII, 337 p. 11 illus.) 225 1 $aSecurity and Cryptology ;$v7496 300 $aInternational conference proceedings. 311 $a3-642-33271-4 320 $aIncludes bibliographical references and author index. 327 $asignature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security. 410 0$aSecurity and Cryptology ;$v7496 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aOperating systems (Computers) 606 $aApplication software 606 $aComputers and civilization 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aOperating systems (Computers). 615 0$aApplication software. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aOperating Systems. 615 24$aComputer Appl. in Administrative Data Processing. 615 24$aComputers and Society. 676 $a005.8 702 $aTakagi$b Tsuyoshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Guilin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aQin$b Zhiguang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJiang$b Shaoquan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYu$b Yong$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465767803316 996 $aProvable Security$9772128 997 $aUNISA