• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

    Provable Security by Baek, Joon Sang; Bao, Feng; Chen, Kefei; Lai, Xuejia;

    Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

    Series: Lecture Notes in Computer Science; 5324;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 53.49
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        22 184 Ft (21 128 Ft + 5% VAT)
      • Discount 20% (cc. 4 437 Ft off)
      • Discounted price 17 748 Ft (16 902 Ft + 5% VAT)

    22 184 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Long description:

    This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008. The 25 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, and Applications.

    More

    Table of Contents:

    Encryption.- Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem.- Tweakable Pseudorandom Permutation from Generalized Feistel Structure.- Timed-Release Encryption Revisited.- Efficient and Provably Secure Certificateless Multi-receiver Signcryption.- A CCA Secure Hybrid Damgård’s ElGamal Encryption.- Signature.- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.- Optimal Online/Offline Signature: How to Sign a Message without Online Computation.- Round-Optimal Blind Signatures from Waters Signatures.- Secure Proxy Multi-signature Scheme in the Standard Model.- Server-Aided Verification Signatures: Definitions and New Constructions.- Analysis.- On Proofs of Security for DAA Schemes.- Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.- Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups.- On the Equivalence of Generic Group Models.- The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.- Application of Hash Functions.- Leaky Random Oracle (Extended Abstract).- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions.- Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?.- Universal Composability.- Relationship of Three Cryptographic Channels in the UC Framework.- A Universally Composable Framework for the Analysis of Browser-Based Security Protocols.- Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library.- Universally Composable Security Analysis of TLS.- Round Optimal Universally Composable Oblivious Transfer Protocols.- Applications.- A Tamper-Evident Voting Machine Resistant to CovertChannels.- Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks.

    More
    Recently viewed
    previous
    20% %discount
    Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

    Advanced Manufacturing Processes: Integration of Sustainable Approaches

    Vasudev, Hitesh; Prakash, Chander; Khalid, Mohammad;(ed.)

    57 330 HUF

    45 864 HUF

    Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

    External Quality Audit: Has It Improved Quality Assurance in Universities?

    Shah, Mahsood; Nair, Chenicheri Sid; (ed.)

    27 352 HUF

    24 617 HUF

    Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

    Super Sons: The Complete Collection Book Two

    Tomasi, Peter J.

    17 583 HUF

    16 177 HUF

    Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

    Debating Christian Theism

    Moreland, J. P.; Sweis, Khaldoun A.; Meister, Chad V.; (ed.)

    24 365 HUF

    21 929 HUF

    20% %discount
    Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

    AI for Communication

    Gunkel, David J.;

    62 107 HUF

    49 686 HUF

    Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

    Global Shaping and its Alternatives

    Atasoy, Yildiz; Carroll, William K.;

    14 810 HUF

    13 329 HUF

    Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

    Agents, Causes, and Events: Essays on Indeterminism and Free Will

    O'Connor, Timothy; (ed.)

    17 915 HUF

    16 124 HUF

    next