Limit search to available items
Record 24 of 149
Previous Record Next Record
Book Cover
E-book
Author ACNS (Conference) (18th : 2020 : Online)

Title Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings. Part II / edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Published Cham : Springer, 2020
©2020

Copies

Description 1 online resource (xix, 478 pages) : illustrations
Series Lecture notes in computer science ; 12147
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 12147.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Part II -- Contents -- Authentication and Biometrics -- A Breach into the Authentication with Built-in Camera (ABC) Protocol -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 ABC Protocol -- 3.2 ABC Protocol Defense Systems -- 3.3 Proposed Attack Scheme -- 4 Experiments -- 4.1 Data Set -- 4.2 Evaluation Details -- 4.3 Results Using Five Images for PRNU Estimation -- 4.4 Results Using One Image for PRNU Estimation -- 5 Discussion -- 5.1 Data Set -- 5.2 Model -- 5.3 Results -- 6 Conclusion -- References
A Practical System for Privacy-Preserving Video Surveillance -- 1 Introduction -- 2 Related Work -- 2.1 Face Recognition -- 2.2 Privacy-Preserving Video Surveillance -- 3 Tools -- 3.1 OpenFace -- 3.2 Homomorphic Encryption -- 4 Problem Definition and Threat Model -- 5 System Description -- 5.1 Offline Phase -- 5.2 Similarity Score Computation -- 5.3 Similarity Score Obfuscation -- 5.4 Matching -- 6 Security -- 7 Performance Comparison -- 8 Implementation Details -- 9 Experimental Results -- 10 Conclusions -- References -- Biometric-Authenticated Searchable Encryption -- 1 Introduction
2 Preliminaries and Building Blocks -- 2.1 Cryptographic Building Blocks -- 2.2 Biometric Sampling and Liveness Assumption -- 3 Biometric-Authenticated Keyword Search: Syntax and Definitions -- 3.1 Syntax of BAKS -- 3.2 Security Definitions -- 4 Construction -- 4.1 Efficiency Analysis and Improvements -- 4.2 Extensions with Multiple Keywords -- 4.3 Biometric Update -- 5 Security Analysis -- 6 Conclusion -- References -- BioLocker: A Practical Biometric Authentication Mechanism Based on 3D Fingervein -- 1 Introduction -- 2 Infrastructure Specification -- 3 Protocols -- 3.1 Access Control Protocols
3.2 Enrollment Protocol -- 4 Biometric Algorithms -- 5 Security Analysis -- 6 Implementation Results -- 7 Conclusion -- References -- Privacy and Anonymity -- Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Intel SGX -- 3.2 Dynamic Searchable Symmetric Encryption -- 4 Our Proposed Schemes -- 4.1 System Overview -- 4.2 Assumptions and Threat Models -- 4.3 Design Intuition -- 4.4 SGX-SE1 Construction -- 4.5 SGX-SE2 Construction -- 4.6 Security Analysis -- 5 Implementation and Evaluation
5.1 Performance Evaluation on the Synthesis Dataset -- 5.2 Performance Evaluation on the Enron Dataset -- 6 Conclusion -- References -- Cluster-Based Anonymization of Knowledge Graphs -- 1 Introduction -- 2 Anonymizing Knowledge Graphs -- 2.1 Adversary Background Knowledge -- 2.2 Anonymity of Knowledge Graphs -- 3 Information Loss Metrics -- 3.1 Attribute and Degree Information Loss -- 3.2 The Attribute Truthfulness Information Loss -- 4 Cluster-Based Knowledge Graph Anonymization -- 4.1 Users' Points Generation -- 4.2 Clusters Generation -- 4.3 Knowledge Graph Generalization -- 5 Experiments -- 5.1 Data Sets
Summary The two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography
Bibliography Includes bibliographical references and author index
Subject Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Algorithms & data structures.
Computer networking & communications.
Information technology: general issues.
Computer security.
Computers -- Information Theory.
Computers -- Networking -- General.
Computers -- Social Aspects -- Human-Computer Interaction.
Computers -- Security -- General.
Computer networks -- Security measures
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Conti, Mauro (Associate professor), editor.
Zhou, Jianying, editor
Casalicchio, Emiliano, editor
Spognardi, Angelo, editor
ISBN 303057878X
9783030578787
Other Titles ACNS 2020