Tell your friends about this item:
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers - Lecture Notes in Computer Science 2015 edition
Dongdai Lin
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers - Lecture Notes in Computer Science 2015 edition
Dongdai Lin
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014.
Marc Notes: Post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. Table of Contents: An Efficient Privacy-Preserving E-coupon System.- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications.- Security of Direct Anonymous Authentication Using TPM 2.0 Signature.- Revocation in Publicly Verifiable Outsourced Computation.- Private Aggregation with Custom Collusion Tolerance.- Ring Signatures of Constant Size Without Random Oracles.- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC.- Optimal Proximity Proofs.- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions.- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.- Fully Homomorphic Encryption with Auxiliary Inputs.- Trapdoors for Ideal Lattices with Applications.- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.- The Boomerang Attacks on BLAKE and BLAKE2.- Second Preimage Analysis of Whirlwind.- Boomerang Attack on Step-Reduced SHA-512.- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique.- Rig: A Simple, Secure and Flexible Design for Password Hashing.- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption.- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks.- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication.- A Note on Diem s Proof.- Stand-by Attacks on E-ID Password Authentication.- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.- A Lightweight Security Isolation Approach for Virtual Machines Deployment.- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors."
Media | Books Paperback Book (Book with soft cover and glued back) |
Released | April 8, 2015 |
ISBN13 | 9783319167442 |
Publishers | Springer International Publishing AG |
Genre | Aspects (Academic) > Science / Technology Aspects |
Pages | 547 |
Dimensions | 155 × 235 × 29 mm · 8.42 kg |
Language | French |
Editor | Lin, Dongdai |
Editor | Yung, Moti |
Editor | Zhou, Jianying |