Amazon cover image
Image from Amazon.com
Image from Google Jackets

Provable Security [electronic resource] : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings / edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 7496Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012Description: XIII, 337 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642332722
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK10470

signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.

This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India