The third International Conference on Provable Security (ProvSec 2009) was held in Guangzhou, China, November 11-13, 2009. It continued the theme of ProvableSecurity initiated by the ProvSec2007 conference in Wollongong, A- tralia. The second ProvSec conference was organized in Shanghai, China. The conference was sponsored by the Center for Advanced Computing - Cryptog- phy and Algorithms (ACAC), Macquarie University, Australia; Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, China; ...
Read More
The third International Conference on Provable Security (ProvSec 2009) was held in Guangzhou, China, November 11-13, 2009. It continued the theme of ProvableSecurity initiated by the ProvSec2007 conference in Wollongong, A- tralia. The second ProvSec conference was organized in Shanghai, China. The conference was sponsored by the Center for Advanced Computing - Cryptog- phy and Algorithms (ACAC), Macquarie University, Australia; Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, China; andthe NationalNaturalScienceFoundationofChina (NSFC).JiwuHuangwas the General Chair and we, Josef Pieprzyk and Fangguo Zhang, were Program Co-chairs. The conference proceedings have been published by Springer in this volume of Lecture Notes in Computer Science. The Program Committee invited two distinguished researchers to deliver their keynote talks. The rst speaker was Alex Dent from Royal Holloway, University of London. His talk was entitled "A Brief History of Security Models for Con?dentiality". The second speaker was Bogdan Warinschi from the University of Bristol, UK, who presented a talk on "Symbolic Methods for Provable Security". We received 64 papers. Each paper was assigned to three referees. Papers submitted by the members of the Program Committee were assigned to ?ve referees. In the rst stage of the review process, the submitted papers were readand evaluated bythe PCmembers and then in the secondstage, the papers werescrutinizedduringanextensivediscussion.Finally, theProgramCommittee chose 19 papers to be included in the conference program. The authors of the accepted papers had three weeks for revision and preparation of ?nal versions.
Read Less