TY - BOOK AU - Susilo,Willy AU - Liu,Joseph K. AU - Mu,Yi ED - SpringerLink (Online service) TI - Provable Security: First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings T2 - Lecture Notes in Computer Science, SN - 9783540756705 AV - QA76.9.A25 U1 - 005.8 23 PY - 2007/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg KW - Computer science KW - Computer security KW - Data structures (Computer science) KW - Data encryption (Computer science) KW - Computers KW - Law and legislation KW - E-commerce KW - Computer Science KW - Systems and Data Security KW - Data Structures, Cryptology and Information Theory KW - Data Encryption KW - e-Commerce/e-business KW - Legal Aspects of Computing KW - Electronic books KW - local N1 - Authentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels -- Asymmetric Encryption -- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks -- Signature -- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function -- Two Notes on the Security of Certificateless Signatures -- A Provably Secure Ring Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use -- Does Secure Time-Stamping Imply Collision-Free Hash Functions? -- Formal Proof of Provable Security by Game-Playing in a Proof Assistant -- Authentication and Symmetric Encryption (Short Papers) -- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication -- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security -- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical Threshold Signatures Without Random Oracles -- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature -- Asymmetric Encryption (Short Papers) -- Formal Security Treatments for Signatures from Identity-Based Encryption -- Decryptable Searchable Encryption UR - http://ezproxy.alfaisal.edu/login?url=http://dx.doi.org/10.1007/978-3-540-75670-5 ER -