Limit search to available items
Book Cover
E-book
Author ISC (Conference : Information security) (14th : 2011 : Xi'an Shi, China)

Title Information security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, proceedings / edited by Xuejia Lai, Jianying Zhou, Hui Li
Published Berlin ; Heidelberg : Springer, ©2011

Copies

Description 1 online resource (xiii, 388 pages)
Series Lecture notes in computer science, 0302-9743 ; 7001
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7001.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Machine generated contents note: Attacks -- Replacement Attacks on Behavior Based Software Birthmark / Li Xie -- Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders / Serdar Pehlivanoglu -- How to Find Short RC4 Colliding Key Pairs / Atsuko Miyaji -- Protocols -- Formal Approach to Distance-Bounding RFID Protocols / Cristina Onete -- MASHA -- Low Cost Authentication with a New Stream Cipher / Kazuhide Fukushima -- Toward Pairing-Free Certificateless Authenticated Key Exchanges / Zhong Chen -- Public-Key Cryptosystems -- Security Analysis of an RSA Key Generation Algorithm with a Large Private Key / Lei Wu -- Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption / Kazumasa Omote -- n-Diffie-Hellman Problem and Its Applications / Yu Chen -- Network Security -- RatBot Anti-enumeration Peer-to-Peer Botnets / Stephan Eidenbenz -- Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes / Simone Fischer-Hubner -- Software Security -- Multi-stage Binary Code Obfuscation Using Improved Virtual Machine / Yin Huang -- Detection and Analysis of Cryptographic Data Inside Software / Ran Yu -- System Security -- Sudo Web: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms / Evangelos P. Markatos -- Hello rootKitty: A Lightweight Invariance-Enforcing Framework / Wouter Joosen -- Opacity Analysis in Trust Management Systems / Masoud Koleini -- Database Security -- On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints / Lena Wiese -- Round-Efficient Oblivious Database Manipulation / Bingsheng Zhang -- Privacy-Preserving Join on Outsourced Database / Feng Xia -- Privacy -- APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks / Josep Domingo-Ferrer
Summary This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures
Analysis Computer science
Software engineering
Data protection
Data encryption (Computer science)
Computer software
Systems and Data Security
Bibliography Includes bibliographical references and author index
In Springer eBooks
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Software
Electronic Data Processing
software.
computer science.
data processing.
Informatique.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Lai, Xuejia.
Zhou, Jianying.
Li, Hui, 1968-
ISBN 9783642248610
3642248616