default search action
Search dblp for Publications
export results for "toc:db/conf/provsec/provsec2010.bht:"
@inproceedings{DBLP:conf/provsec/Aimani10, author = {Laila El Aimani}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {87--101}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_6}, doi = {10.1007/978-3-642-16280-0\_6}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Aimani10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/AnadaA10, author = {Hiroaki Anada and Seiko Arita}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {18--34}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_2}, doi = {10.1007/978-3-642-16280-0\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/AnadaA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BaigneresSV10, author = {Thomas Baign{\`{e}}res and Pouyan Sepehrdad and Serge Vaudenay}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Distinguishing Distributions Using Chernoff Information}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {144--165}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_10}, doi = {10.1007/978-3-642-16280-0\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BaigneresSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/CayrelLRS10, author = {Pierre{-}Louis Cayrel and Richard Lindner and Markus R{\"{u}}ckert and Rosemberg Silva}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Improved Zero-Knowledge Identification with Lattices}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {1--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_1}, doi = {10.1007/978-3-642-16280-0\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/CayrelLRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/EmuraMO10, author = {Keita Emura and Atsuko Miyaji and Kazumasa Omote}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {184--198}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_12}, doi = {10.1007/978-3-642-16280-0\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/EmuraMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/EmuraMO10a, author = {Keita Emura and Atsuko Miyaji and Kazumasa Omote}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {200--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_14}, doi = {10.1007/978-3-642-16280-0\_14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/EmuraMO10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/FleischmannFGL10, author = {Ewan Fleischmann and Christian Forler and Michael Gorski and Stefan Lucks}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Collision Resistant Double-Length Hashing}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {102--118}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_7}, doi = {10.1007/978-3-642-16280-0\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/FleischmannFGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/HerranzRS10, author = {Javier Herranz and Alexandre Ruiz and Germ{\'{a}}n S{\'{a}}ez}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Fully Secure Threshold Unsigncryption}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {261--278}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_18}, doi = {10.1007/978-3-642-16280-0\_18}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/HerranzRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/KikuchiPO10, author = {Ryo Kikuchi and Le Trieu Phong and Wakaha Ogata}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {A Framework for Constructing Convertible Undeniable Signatures}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {70--86}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_5}, doi = {10.1007/978-3-642-16280-0\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/KikuchiPO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Kiltz10, author = {Eike Kiltz}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Cryptographic Protocols from Lattices}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_13}, doi = {10.1007/978-3-642-16280-0\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Kiltz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NgoBN10, author = {Long Ngo and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Automating Computational Proofs for Public-Key-Based Key Exchange}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {53--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_4}, doi = {10.1007/978-3-642-16280-0\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NgoBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NowakZ10, author = {David Nowak and Yu Zhang}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {A Calculus for Game-Based Security Proofs}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {35--52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_3}, doi = {10.1007/978-3-642-16280-0\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NowakZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/OhtakeHO10, author = {Go Ohtake and Goichiro Hanaoka and Kazuto Ogawa}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Efficient Broadcast Encryption with Personalized Messages}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {214--228}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_15}, doi = {10.1007/978-3-642-16280-0\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/OhtakeHO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PengB10, author = {Kun Peng and Feng Bao}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Formal and Precise Analysis of Soundness of Several Shuffling Schemes}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {133--143}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_9}, doi = {10.1007/978-3-642-16280-0\_9}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Sarinay10, author = {Juraj Sarinay}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Interpreting Hash Function Security Proofs}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {119--132}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_8}, doi = {10.1007/978-3-642-16280-0\_8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/Sarinay10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SelviVR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Identity Based Public Verifiable Signcryption Scheme}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {244--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_17}, doi = {10.1007/978-3-642-16280-0\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/SelviVR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TsangALSW10, author = {Patrick P. Tsang and Man Ho Au and Joseph K. Liu and Willy Susilo and Duncan S. Wong}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {166--183}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_11}, doi = {10.1007/978-3-642-16280-0\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/TsangALSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YamadaHK10, author = {Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {229--243}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_16}, doi = {10.1007/978-3-642-16280-0\_16}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YamadaHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2010, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0}, doi = {10.1007/978-3-642-16280-0}, isbn = {978-3-642-16279-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.