Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8782)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ProvSec: International Conference on Provable Security
Conference proceedings info: ProvSec 2014.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (26 papers)
-
Front Matter
-
Invited Paper
About this book
Keywords
- access control
- athematical foundations of cryptography
- block and stream ciphers
- cryptanalysis and other attacks
- cryptographic primitives
- cryptographic protocols
- data encryption
- digital signatures
- hash functions
- information-theoretic techniques
- management and querying of encrypted data
- message authentication codes
- privacy-preserving protocols
- pseudonymity, anonymity and untraceability
- public key (asymmetric) techniques
- public key encryption
- symmetric cryptography
Editors and Affiliations
-
Department of Information Engineering, Chinese University of Hong Kong, Sha Tin, N.T., Hong Kong
Sherman S. M. Chow
-
Institute for Infocomm Research, A*STAR, Singapore, Singapore
Joseph K. Liu
-
Department of Computer Science, The University of Hong Kong, Hong Kong
Lucas C. K. Hui, Siu Ming Yiu
Bibliographic Information
Book Title: Provable Security
Book Subtitle: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
Editors: Sherman S. M. Chow, Joseph K. Liu, Lucas C. K. Hui, Siu Ming Yiu
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-12475-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Softcover ISBN: 978-3-319-12474-2Published: 08 October 2014
eBook ISBN: 978-3-319-12475-9Published: 01 October 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 351
Number of Illustrations: 41 b/w illustrations
Topics: Cryptology, Systems and Data Security, Computers and Society, Computer Appl. in Administrative Data Processing, Management of Computing and Information Systems