Limit search to available items
Book Cover
E-book
Author International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (2013 : Regensburg, Germany)

Title Security engineering and intelligence informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings / Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu (eds.)
Published Heidelberg : Springer, 2013

Copies

Description 1 online resource (xiv, 466 pages) : illustrations
Series Lecture Notes in Computer Science, 0302-9743 ; 8128
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI
Lecture notes in computer science ; 8128, 0302-9743
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Contents Modern Cryptography. Symmetric-Key Cryptography. Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock / Jiageng Chen, Atsuko Miyaji -- Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions / Asato Kubai, Junji Shikata, Yohei Watanabe -- On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography / Kishan Chand Gupta, Indranil Ghosh Ray
Public-Key Cryptography. Code-Based Public-Key Encryption Resistant to Key Leakage / Edoardo Persichetti -- Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics / Masaya Yasuda [and others]
Koshiba Algorithmic Cryptanalysis. A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images / Abdel Alim Kamal, Roger Zahno, Amr M. Youssef -- Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method / Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann -- On the Security of LBlock against the Cube Attack and Side Channel Cube Attack / Saad Islam, Mehreen Afzal, Adnan Rashdi
Security Engineering. Software and Hardware Implementation of Cryptographic Algorithms. Code-Based Identification and Signature Schemes in Software / Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani -- Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine / Danilo Câmara [and others] -- Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves / Gerwin Gsenger, Christian Hanser -- Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves / Christian Hanser, Christian Wagner
Database Encryption. Cumulus4j: A Provably Secure Database Abstraction Layer / Matthias Huber [and others] -- Interaction between Cryptographic Theory and Implementation Issues. Optimal Parameters for XMSS MT / Andreas Hülsing, Lea Rausch, Johannes Buchmann -- Solving the Discrete Logarithm Problem for Packing Candidate Preferences / James Heather [and others] -- SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences / Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen
Cyber Security and Dependability. Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace / Clara Maria Colombini [and others] -- Analyzing the Internet Stability in Presence of Disasters / Francesco Palmieri [and others] -- Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project / Thomas Schaberreiter [and others] -- How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function / Wolfgang Boehmer -- Using Probabilistic Analysis for the Certification of Machine Control Systems / Atif Mashkoor, Osman Hasan, Wolfgang Beer -- Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms / Suliman A. Alsuhibany [and others]
Network Security and Privacy. A Multiple-Key Management Scheme in Wireless Sensor Networks / Jung-Chun Liu [and others] -- VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment / Igor Kotenko, Evgenia Novikova -- A Denial of Service Attack to GSM Networks via Attach Procedure / Nicola Gobbo, Alessio Merlo, Mauro Migliardi -- PPM: Privacy Policy Manager for Personalized Services / Shinsaku Kiyomoto [and others] -- An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks / Bo Liu [and others]
Multimedia Technology for Homeland Defense. Intelligent UBMSS Systems for Strategic Information Management / Lidia Ogiela, Marek R. Ogiela -- Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness / Arcangelo Castiglione [and others] -- Computer Karate Trainer in Tasks of Personal and Homeland Security Defense / Tomasz Hachaj, Marek R. Ogiela -- Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios / Francesco Flammini [and others] -- A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process / Vaise Patu, Shuichiro Yamamoto
Summary This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed August 20, 2013)
Subject Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks.
Computer security.
Computer Communication Networks
Computer Security
Computer security
Computer networks
Computer networks -- Security measures
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Cuzzocrea, Alfredo, 1974- editor.
MoCrySEn 2013 (2013 : Regensburg, Germany)
SeCIHD 2013 (2013 : Regensburg, Germany)
ISBN 9783642405884
3642405886
Other Titles CD-ARES 2013 Workshops
MoCrySEn 2013
SeCIHD 2013