Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/provsec/provsec2008.bht:"
@inproceedings{DBLP:conf/provsec/BressonCCGPP08, author = {Emmanuel Bresson and Beno{\^{\i}}t Chevallier{-}Mames and Christophe Clavier and Aline Gouget and Pascal Paillier and Thomas Peyrin}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {How to Use Merkle-Damg{\aa}rd - On the Security Relations between Signature Schemes and Their Inner Hash Functions}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {241--253}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_17}, doi = {10.1007/978-3-540-88733-1\_17}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BressonCCGPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BuldasN08, author = {Ahto Buldas and Margus Niitsoo}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {254--267}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_18}, doi = {10.1007/978-3-540-88733-1\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BuldasN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChenMS08, author = {Liqun Chen and Paul Morrissey and Nigel P. Smart}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {On Proofs of Security for {DAA} Schemes}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {156--175}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_11}, doi = {10.1007/978-3-540-88733-1\_11}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ChenMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChowY08, author = {Sherman S. M. Chow and Siu{-}Ming Yiu}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Timed-Release Encryption Revisited}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {38--51}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_3}, doi = {10.1007/978-3-540-88733-1\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ChowY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DesmedtP08, author = {Yvo Desmedt and Duong Hieu Phan}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {A {CCA} Secure Hybrid Damg{\aa}rd's ElGamal Encryption}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {68--82}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_5}, doi = {10.1007/978-3-540-88733-1\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DesmedtP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DuH08, author = {Wei Du and Mingxing He}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {345--359}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_25}, doi = {10.1007/978-3-540-88733-1\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DuH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Gajek08, author = {Sebastian Gajek}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {A Universally Composable Framework for the Analysis of Browser-Based Security Protocols}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {283--297}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_20}, doi = {10.1007/978-3-540-88733-1\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Gajek08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/GajekMPSS08, author = {Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Universally Composable Security Analysis of {TLS}}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {313--327}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_22}, doi = {10.1007/978-3-540-88733-1\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/GajekMPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/GjosteenK08, author = {Kristian Gj{\o}steen and Lillian Kr{\aa}kmo}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Round-Optimal Blind Signatures from Waters Signatures}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {112--126}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_8}, doi = {10.1007/978-3-540-88733-1\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/GjosteenK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/GuoM08, author = {Fuchun Guo and Yi Mu}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Optimal Online/Offline Signature: How to Sign a Message without Online Computation}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {98--111}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_7}, doi = {10.1007/978-3-540-88733-1\_7}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/GuoM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/HanHZCC08, author = {Wei Han and Tao Hao and Dong Zheng and Kefei Chen and Xiaofeng Chen}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {A Tamper-Evident Voting Machine Resistant to Covert Channels}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {335--344}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_24}, doi = {10.1007/978-3-540-88733-1\_24}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/HanHZCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/HuangYZX08, author = {Huawei Huang and Bo Yang and Shenglin Zhu and Guozhen Xiao}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {1--21}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_1}, doi = {10.1007/978-3-540-88733-1\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/HuangYZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/JagerS08, author = {Tibor Jager and J{\"{o}}rg Schwenk}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {On the Equivalence of Generic Group Models}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {200--209}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_14}, doi = {10.1007/978-3-540-88733-1\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/JagerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LaudN08, author = {Peeter Laud and Long Ngo}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {298--312}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_21}, doi = {10.1007/978-3-540-88733-1\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LaudN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiuHM08, author = {Zhenhua Liu and Yupu Hu and Hua Ma}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Secure Proxy Multi-signature Scheme in the Standard Model}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {127--140}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_9}, doi = {10.1007/978-3-540-88733-1\_9}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiuHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Luo08, author = {Zhengqin Luo}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {185--199}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_13}, doi = {10.1007/978-3-540-88733-1\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Luo08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/MitsudaI08, author = {Atsushi Mitsuda and Tetsu Iwata}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Tweakable Pseudorandom Permutation from Generalized Feistel Structure}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {22--37}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_2}, doi = {10.1007/978-3-540-88733-1\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/MitsudaI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NagaoMO08, author = {Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Relationship of Three Cryptographic Channels in the {UC} Framework}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {268--282}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_19}, doi = {10.1007/978-3-540-88733-1\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NagaoMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SelviVSC08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Deepanshu Shukla and C. Pandu Rangan}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Efficient and Provably Secure Certificateless Multi-receiver Signcryption}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {52--67}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_4}, doi = {10.1007/978-3-540-88733-1\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/SelviVSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WuMSH08, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Server-Aided Verification Signatures: Definitions and New Constructions}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {141--155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_10}, doi = {10.1007/978-3-540-88733-1\_10}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/WuMSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YoneyamaMO08, author = {Kazuki Yoneyama and Satoshi Miyagawa and Kazuo Ohta}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Leaky Random Oracle (Extended Abstract)}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {226--240}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_16}, doi = {10.1007/978-3-540-88733-1\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YoneyamaMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YuKCHL08, author = {Jia Yu and Fanyu Kong and Xiangguo Cheng and Rong Hao and Guowen Li}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {83--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_6}, doi = {10.1007/978-3-540-88733-1\_6}, timestamp = {Thu, 19 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YuKCHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YuKCHL08a, author = {Jia Yu and Fanyu Kong and Xiangguo Cheng and Rong Hao and Guowen Li}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Cryptanalysis of Vo-Kim Forward Secure Signature in {ICISC} 2005}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {176--184}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_12}, doi = {10.1007/978-3-540-88733-1\_12}, timestamp = {Thu, 19 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YuKCHL08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Zhu08, author = {Huafei Zhu}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Round Optimal Universally Composable Oblivious Transfer Protocols}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {328--334}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_23}, doi = {10.1007/978-3-540-88733-1\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Zhu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhuZW08, author = {Zhenchao Zhu and Yuqing Zhang and Fengjiao Wang}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {210--225}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_15}, doi = {10.1007/978-3-540-88733-1\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhuZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2008, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1}, doi = {10.1007/978-3-540-88733-1}, isbn = {978-3-540-88732-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.