FEEDBACK Smiley face
Normal view MARC view ISBD view

Provable Security [electronic resource] :6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings /

Contributor(s): Takagi, Tsuyoshi [editor.] | Wang, Guilin [editor.] | Qin, Zhiguang [editor.] | Jiang, Shaoquan [editor.] | Yu, Yong [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 7496Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.Description: XIII, 337 p. 11 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642332722.Subject(s): Computer science | Operating systems (Computers) | Computer security | Data encryption (Computer science) | Application software | Computers and civilization | Management information systems | Computer Science | Data Encryption | Systems and Data Security | Management of Computing and Information Systems | Operating Systems | Computer Appl. in Administrative Data Processing | Computers and SocietyOnline resources: Click here to access online
Contents:
signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.

This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in