Search dblp for Publications

export results for "toc:db/conf/provsec/provsec2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/provsec/Aimani10,
  author       = {Laila El Aimani},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Efficient Confirmer Signatures from the "Signature of a Commitment"
                  Paradigm},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_6},
  doi          = {10.1007/978-3-642-16280-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Aimani10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AnadaA10,
  author       = {Hiroaki Anada and
                  Seiko Arita},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Identification Schemes of Proofs of Ability Secure against Concurrent
                  Man-in-the-Middle Attacks},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_2},
  doi          = {10.1007/978-3-642-16280-0\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/AnadaA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BaigneresSV10,
  author       = {Thomas Baign{\`{e}}res and
                  Pouyan Sepehrdad and
                  Serge Vaudenay},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Distinguishing Distributions Using Chernoff Information},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {144--165},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_10},
  doi          = {10.1007/978-3-642-16280-0\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BaigneresSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/CayrelLRS10,
  author       = {Pierre{-}Louis Cayrel and
                  Richard Lindner and
                  Markus R{\"{u}}ckert and
                  Rosemberg Silva},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Improved Zero-Knowledge Identification with Lattices},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_1},
  doi          = {10.1007/978-3-642-16280-0\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/CayrelLRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/EmuraMO10,
  author       = {Keita Emura and
                  Atsuko Miyaji and
                  Kazumasa Omote},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {An Anonymous Designated Verifier Signature Scheme with Revocation:
                  How to Protect a Company's Reputation},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_12},
  doi          = {10.1007/978-3-642-16280-0\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/EmuraMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/EmuraMO10a,
  author       = {Keita Emura and
                  Atsuko Miyaji and
                  Kazumasa Omote},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {A Timed-Release Proxy Re-encryption Scheme and Its Application to
                  Fairly-Opened Multicast Communication},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {200--213},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_14},
  doi          = {10.1007/978-3-642-16280-0\_14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/EmuraMO10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FleischmannFGL10,
  author       = {Ewan Fleischmann and
                  Christian Forler and
                  Michael Gorski and
                  Stefan Lucks},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Collision Resistant Double-Length Hashing},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {102--118},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_7},
  doi          = {10.1007/978-3-642-16280-0\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FleischmannFGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HerranzRS10,
  author       = {Javier Herranz and
                  Alexandre Ruiz and
                  Germ{\'{a}}n S{\'{a}}ez},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Fully Secure Threshold Unsigncryption},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_18},
  doi          = {10.1007/978-3-642-16280-0\_18},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/HerranzRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/KikuchiPO10,
  author       = {Ryo Kikuchi and
                  Le Trieu Phong and
                  Wakaha Ogata},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {A Framework for Constructing Convertible Undeniable Signatures},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {70--86},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_5},
  doi          = {10.1007/978-3-642-16280-0\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/KikuchiPO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Kiltz10,
  author       = {Eike Kiltz},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Cryptographic Protocols from Lattices},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_13},
  doi          = {10.1007/978-3-642-16280-0\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Kiltz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NgoBN10,
  author       = {Long Ngo and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Automating Computational Proofs for Public-Key-Based Key Exchange},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {53--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_4},
  doi          = {10.1007/978-3-642-16280-0\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NgoBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NowakZ10,
  author       = {David Nowak and
                  Yu Zhang},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {A Calculus for Game-Based Security Proofs},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {35--52},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_3},
  doi          = {10.1007/978-3-642-16280-0\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NowakZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/OhtakeHO10,
  author       = {Go Ohtake and
                  Goichiro Hanaoka and
                  Kazuto Ogawa},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Efficient Broadcast Encryption with Personalized Messages},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {214--228},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_15},
  doi          = {10.1007/978-3-642-16280-0\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/OhtakeHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Formal and Precise Analysis of Soundness of Several Shuffling Schemes},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {133--143},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_9},
  doi          = {10.1007/978-3-642-16280-0\_9},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Sarinay10,
  author       = {Juraj Sarinay},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Interpreting Hash Function Security Proofs},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_8},
  doi          = {10.1007/978-3-642-16280-0\_8},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/Sarinay10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SelviVR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Identity Based Public Verifiable Signcryption Scheme},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {244--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_17},
  doi          = {10.1007/978-3-642-16280-0\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SelviVR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TsangALSW10,
  author       = {Patrick P. Tsang and
                  Man Ho Au and
                  Joseph K. Liu and
                  Willy Susilo and
                  Duncan S. Wong},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with
                  Different Levels of Anonymity (Extended Abstract)},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {166--183},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_11},
  doi          = {10.1007/978-3-642-16280-0\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/TsangALSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YamadaHK10,
  author       = {Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext
                  Security from the Decisional Diffie-Hellman Assumption},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {229--243},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_16},
  doi          = {10.1007/978-3-642-16280-0\_16},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YamadaHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2010,
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0},
  doi          = {10.1007/978-3-642-16280-0},
  isbn         = {978-3-642-16279-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}