Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10592)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ProvSec 2017.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.
Similar content being viewed by others
Keywords
Table of contents (29 papers)
-
Secure Cloud Storage and Computing
-
Digital Signature and Authentication
-
Authenticated Encryption and Key Exchange
-
Security Models
Other volumes
-
Provable Security
Editors and Affiliations
Bibliographic Information
Book Title: Provable Security
Book Subtitle: 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings
Editors: Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-68637-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Softcover ISBN: 978-3-319-68636-3Published: 18 October 2017
eBook ISBN: 978-3-319-68637-0Published: 17 October 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 508
Number of Illustrations: 37 b/w illustrations
Topics: Cryptology, Systems and Data Security, Computers and Society, Computer Appl. in Administrative Data Processing, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity