Limit search to available items
Book Cover
E-book
Author ATIS (Conference) (6th : 2015 : Beijing, China)

Title Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, proceedings / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten
Published Heidelberg : Springer, 2015
©2015

Copies

Description 1 online resource (xvii, 398 pages) : color illustrations
Series Communications in Computer and Information Science, 1865-0929 ; 557
Communications in computer and information science ; 557. 1865-0929
Contents Intro; Preface; Organization; Invited Speeches; Memory Scrapper Attacks -- Threats and Mitigations; A Simple and Provable Secure (Authenticated) Key Exchange Based on LWE; Contents; Cryptograph; An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map; Abstract; 1 Introduction; 2 Basic Theory of the Proposed Algorithm; 2.1 Zigzag Transformation; 2.2 3-Dimension Logistic Chaotic Map; 3 Algorithm Described; 4 Simulation Result; 5 The Security Analysis; 5.1 Resistance to Exhaustive Attack; 5.1.1 Analysis of Key Space; 5.1.2 Keys' Sensitivity Analysis
5.2 Resistance to Statistical Attack5.2.1 The Grey Histogram Analysis; 5.2.2 Correlation Coefficient Analysis; 5.3 Information Entropy Analysis; 5.4 Compare the Efficiency of Encryption and Decryption; 6 Conclusion; Acknowledgements; References; An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme; 1 Introduction; 2 Preliminaries; 3 Security Analysis of Liang et al.'s CR-IB-PRE Scheme; 4 Syntax and Security Definition for CR-IB-PRE Scheme; 5 Our Improved CR-IB-PRE Scheme; 6 Security and Efficiency Analysis; 7 Conclusion; References
Cryptographic Public Key Length PredictionAbstract; 1 Introduction; 2 Key Length Prediction; 2.1 Lenstra and Verheul Equations; 2.2 Lenstra Update Equations; 2.3 The Network Working Group RFC3766; 2.4 ECRYPT and ECRYPT II; 2.5 Nist; 2.6 Anssi; 2.7 BSI; 3 Moore's Law; 4 Experiments and Environment; 5 Summary and Conclusions; References; An Image Encryption Algorithm Based on Chua's Chaos and Baker's Transformation; 1 Introduction; 2 Chaos Theory; 3 Baker's Transformation; 4 Encryption Methodology; 5 Experimental Results and Analysis; 5.1 Experimental Results; 5.2 Experimental Analysis
6 ConclusionReferences; Quantum Differential Cryptanalysis to the Block Ciphers; 1 Introduction; 2 Preliminaries; 2.1 Classical Differential Cryptanalysis; 2.2 The Bernstein -- Vazirani Algorithm; 2.3 Results After Running the Bernstein -- Vazirani Algorithm; 3 Quantum Algorithm to Execute Differential Cryptanalysis; 3.1 The First Method; 3.2 The Second Method; 4 Discussions and Conclusions; References; An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes o ... ; Abstract; 1 Introduction; 2 Preliminaries; 2.1 VPN; 2.2 Platform Security Attributes
2.3 Attribute Based Encryption3 Problem Definition; 3.1 Our Goals; 3.2 Threat Model and Assumptions; 4 Design; 4.1 Authentication Scheme Overview; 4.2 Platform Attributes Extraction; 4.3 Security Requirements Classification; 5 Implementation; 5.1 Platform Attributes Expression; 5.2 Remote Authentication Framework; 5.3 ABE Based Authentication; 5.4 Trusted Computing Based Attributes; 6 Analysis; 6.1 Security Analysis; 6.2 Performance Analysis; 7 Conclusion; References; Public Key Timed-Release Attribute-Based Encryption; 1 Introduction; 1.1 Our Contributions; 1.2 Related Work; 1.3 Organization
Summary This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations
Bibliography Includes bibliographical references and index
Notes English
Subject Internet -- Security measures -- Congresses
Computer networks -- Security measures -- Congresses
Computer science.
Computer security
Data encryption (Computer science)
Algorithms.
Electronic Data Processing
Computer Security
Algorithms
algorithms.
Data encryption.
Algorithms & data structures.
Computer security.
Computers -- Security -- General.
Computers -- Programming -- Algorithms.
Algorithms
Computer networks -- Security measures
Computer science
Computer security
Data encryption (Computer science)
Internet -- Security measures
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Niu, Wenjia, editor.
Li, Gang (Computer scientist), editor.
Liu, Jiqiang, editor
Tan, Jianlong, editor
Guo, Li, editor
Han, Zhen, editor
Batten, Lynn, editor
ISBN 9783662486832
3662486830