Provable Security 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings / [electronic resource] :
edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu.
- 1st ed. 2012.
- XIII, 337 p. 11 illus. online resource.
- Security and Cryptology, 7496 2946-1863 ; .
- Security and Cryptology, 7496 .
signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
9783642332722
10.1007/978-3-642-33272-2 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Operating systems (Computers).
Information technology--Management.
Computers and civilization.
Cryptology.
Data and Information Security.
IT Operations.
Operating Systems.
Computer Application in Administrative Data Processing.
Computers and Society.
QA268
005.824
signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
9783642332722
10.1007/978-3-642-33272-2 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Operating systems (Computers).
Information technology--Management.
Computers and civilization.
Cryptology.
Data and Information Security.
IT Operations.
Operating Systems.
Computer Application in Administrative Data Processing.
Computers and Society.
QA268
005.824