Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings /: 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings. (2019)
- Record Type:
- Book
- Title:
- Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings /: 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings. (2019)
- Main Title:
- Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings
- Further Information:
- Note: Ron Steinfeld, Tsz Hon Yuen.
- Editors:
- Steinfeld, Ron
Yuen, Tsz Hon - Other Names:
- ProvSec (Conference), 13th
- Contents:
- Lattice-based IBE with equality test in standard model.- A critique of game-based definitions of receipt-freeness for voting.- One-Round Authenticated Group Key Exchange from Isogenies.- History-Free Sequential Aggregate MAC Revisited.- An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature.- Secure Online/Offline Attribute-based Encryption for IOT Users in Cloud Computing.- Identity-Concealed Authenticated Encryption from Ring Learning With Errors.- Towards Enhanced Security for Certificateless Public-key Authenticated Encryption with Keyword Search.- TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-invisibility.- A Lattice-Based Anonymous Distributed E-Cash from Bitcoin.- Plaintext-Verifiably-Checkable Encryption.- Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem.- Hierarchical Functional Signcryption: Notion and Construction.- FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme.- A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection.- Password-based Authenticated Key Exchange from Standard Isogeny Assumptions.- A centralized digital currency system with rich functions.- A Practical Lattice-Based Sequential Aggregate Signature.- Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.- Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG.- A Coin-FreeLattice-based IBE with equality test in standard model.- A critique of game-based definitions of receipt-freeness for voting.- One-Round Authenticated Group Key Exchange from Isogenies.- History-Free Sequential Aggregate MAC Revisited.- An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature.- Secure Online/Offline Attribute-based Encryption for IOT Users in Cloud Computing.- Identity-Concealed Authenticated Encryption from Ring Learning With Errors.- Towards Enhanced Security for Certificateless Public-key Authenticated Encryption with Keyword Search.- TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-invisibility.- A Lattice-Based Anonymous Distributed E-Cash from Bitcoin.- Plaintext-Verifiably-Checkable Encryption.- Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem.- Hierarchical Functional Signcryption: Notion and Construction.- FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme.- A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection.- Password-based Authenticated Key Exchange from Standard Isogeny Assumptions.- A centralized digital currency system with rich functions.- A Practical Lattice-Based Sequential Aggregate Signature.- Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.- Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG.- A Coin-Free Oracle-Based Augmented Black Box Framework.- Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks.- Solving ECDLP via List Decoding.- On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2019
- Copyright Date:
- 2019
- Extent:
- 1 online resource (382 pages)
- Subjects:
- Computer science
Data encryption (Computer science)
Information systems
Software engineering
Computers -- Social Aspects -- Human-Computer Interaction
Computers -- Online Services -- General
Computers -- Software Development & Engineering -- General
Information technology: general issues
Computer networking & communications
Software Engineering
Computers -- Security -- General
Coding theory & cryptology - Languages:
- English
- ISBNs:
- 9783030319199
- Related ISBNs:
- 9783030319182
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.459048
- Ingest File:
- 02_599.xml