Description |
1 online resource (xvii, 398 pages) : color illustrations |
Series |
Communications in Computer and Information Science, 1865-0929 ; 557 |
|
Communications in computer and information science ; 557. 1865-0929
|
Contents |
Intro; Preface; Organization; Invited Speeches; Memory Scrapper Attacks -- Threats and Mitigations; A Simple and Provable Secure (Authenticated) Key Exchange Based on LWE; Contents; Cryptograph; An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map; Abstract; 1 Introduction; 2 Basic Theory of the Proposed Algorithm; 2.1 Zigzag Transformation; 2.2 3-Dimension Logistic Chaotic Map; 3 Algorithm Described; 4 Simulation Result; 5 The Security Analysis; 5.1 Resistance to Exhaustive Attack; 5.1.1 Analysis of Key Space; 5.1.2 Keys' Sensitivity Analysis |
|
5.2 Resistance to Statistical Attack5.2.1 The Grey Histogram Analysis; 5.2.2 Correlation Coefficient Analysis; 5.3 Information Entropy Analysis; 5.4 Compare the Efficiency of Encryption and Decryption; 6 Conclusion; Acknowledgements; References; An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme; 1 Introduction; 2 Preliminaries; 3 Security Analysis of Liang et al.'s CR-IB-PRE Scheme; 4 Syntax and Security Definition for CR-IB-PRE Scheme; 5 Our Improved CR-IB-PRE Scheme; 6 Security and Efficiency Analysis; 7 Conclusion; References |
|
Cryptographic Public Key Length PredictionAbstract; 1 Introduction; 2 Key Length Prediction; 2.1 Lenstra and Verheul Equations; 2.2 Lenstra Update Equations; 2.3 The Network Working Group RFC3766; 2.4 ECRYPT and ECRYPT II; 2.5 Nist; 2.6 Anssi; 2.7 BSI; 3 Moore's Law; 4 Experiments and Environment; 5 Summary and Conclusions; References; An Image Encryption Algorithm Based on Chua's Chaos and Baker's Transformation; 1 Introduction; 2 Chaos Theory; 3 Baker's Transformation; 4 Encryption Methodology; 5 Experimental Results and Analysis; 5.1 Experimental Results; 5.2 Experimental Analysis |
|
6 ConclusionReferences; Quantum Differential Cryptanalysis to the Block Ciphers; 1 Introduction; 2 Preliminaries; 2.1 Classical Differential Cryptanalysis; 2.2 The Bernstein -- Vazirani Algorithm; 2.3 Results After Running the Bernstein -- Vazirani Algorithm; 3 Quantum Algorithm to Execute Differential Cryptanalysis; 3.1 The First Method; 3.2 The Second Method; 4 Discussions and Conclusions; References; An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes o ... ; Abstract; 1 Introduction; 2 Preliminaries; 2.1 VPN; 2.2 Platform Security Attributes |
|
2.3 Attribute Based Encryption3 Problem Definition; 3.1 Our Goals; 3.2 Threat Model and Assumptions; 4 Design; 4.1 Authentication Scheme Overview; 4.2 Platform Attributes Extraction; 4.3 Security Requirements Classification; 5 Implementation; 5.1 Platform Attributes Expression; 5.2 Remote Authentication Framework; 5.3 ABE Based Authentication; 5.4 Trusted Computing Based Attributes; 6 Analysis; 6.1 Security Analysis; 6.2 Performance Analysis; 7 Conclusion; References; Public Key Timed-Release Attribute-Based Encryption; 1 Introduction; 1.1 Our Contributions; 1.2 Related Work; 1.3 Organization |
Summary |
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations |
Bibliography |
Includes bibliographical references and index |
Notes |
English |
Subject |
Internet -- Security measures -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer science.
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Algorithms.
|
|
Electronic Data Processing
|
|
Computer Security
|
|
Algorithms
|
|
algorithms.
|
|
Data encryption.
|
|
Algorithms & data structures.
|
|
Computer security.
|
|
Computers -- Security -- General.
|
|
Computers -- Programming -- Algorithms.
|
|
Algorithms
|
|
Computer networks -- Security measures
|
|
Computer science
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Internet -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Niu, Wenjia, editor.
|
|
Li, Gang (Computer scientist), editor.
|
|
Liu, Jiqiang, editor
|
|
Tan, Jianlong, editor
|
|
Guo, Li, editor
|
|
Han, Zhen, editor
|
|
Batten, Lynn, editor
|
ISBN |
9783662486832 |
|
3662486830 |
|