Description |
1 online resource (xix, 478 pages) : illustrations |
Series |
Lecture notes in computer science ; 12147 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 12147.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Part II -- Contents -- Authentication and Biometrics -- A Breach into the Authentication with Built-in Camera (ABC) Protocol -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 ABC Protocol -- 3.2 ABC Protocol Defense Systems -- 3.3 Proposed Attack Scheme -- 4 Experiments -- 4.1 Data Set -- 4.2 Evaluation Details -- 4.3 Results Using Five Images for PRNU Estimation -- 4.4 Results Using One Image for PRNU Estimation -- 5 Discussion -- 5.1 Data Set -- 5.2 Model -- 5.3 Results -- 6 Conclusion -- References |
|
A Practical System for Privacy-Preserving Video Surveillance -- 1 Introduction -- 2 Related Work -- 2.1 Face Recognition -- 2.2 Privacy-Preserving Video Surveillance -- 3 Tools -- 3.1 OpenFace -- 3.2 Homomorphic Encryption -- 4 Problem Definition and Threat Model -- 5 System Description -- 5.1 Offline Phase -- 5.2 Similarity Score Computation -- 5.3 Similarity Score Obfuscation -- 5.4 Matching -- 6 Security -- 7 Performance Comparison -- 8 Implementation Details -- 9 Experimental Results -- 10 Conclusions -- References -- Biometric-Authenticated Searchable Encryption -- 1 Introduction |
|
2 Preliminaries and Building Blocks -- 2.1 Cryptographic Building Blocks -- 2.2 Biometric Sampling and Liveness Assumption -- 3 Biometric-Authenticated Keyword Search: Syntax and Definitions -- 3.1 Syntax of BAKS -- 3.2 Security Definitions -- 4 Construction -- 4.1 Efficiency Analysis and Improvements -- 4.2 Extensions with Multiple Keywords -- 4.3 Biometric Update -- 5 Security Analysis -- 6 Conclusion -- References -- BioLocker: A Practical Biometric Authentication Mechanism Based on 3D Fingervein -- 1 Introduction -- 2 Infrastructure Specification -- 3 Protocols -- 3.1 Access Control Protocols |
|
3.2 Enrollment Protocol -- 4 Biometric Algorithms -- 5 Security Analysis -- 6 Implementation Results -- 7 Conclusion -- References -- Privacy and Anonymity -- Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Intel SGX -- 3.2 Dynamic Searchable Symmetric Encryption -- 4 Our Proposed Schemes -- 4.1 System Overview -- 4.2 Assumptions and Threat Models -- 4.3 Design Intuition -- 4.4 SGX-SE1 Construction -- 4.5 SGX-SE2 Construction -- 4.6 Security Analysis -- 5 Implementation and Evaluation |
|
5.1 Performance Evaluation on the Synthesis Dataset -- 5.2 Performance Evaluation on the Enron Dataset -- 6 Conclusion -- References -- Cluster-Based Anonymization of Knowledge Graphs -- 1 Introduction -- 2 Anonymizing Knowledge Graphs -- 2.1 Adversary Background Knowledge -- 2.2 Anonymity of Knowledge Graphs -- 3 Information Loss Metrics -- 3.1 Attribute and Degree Information Loss -- 3.2 The Attribute Truthfulness Information Loss -- 4 Cluster-Based Knowledge Graph Anonymization -- 4.1 Users' Points Generation -- 4.2 Clusters Generation -- 4.3 Knowledge Graph Generalization -- 5 Experiments -- 5.1 Data Sets |
Summary |
The two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography |
Bibliography |
Includes bibliographical references and author index |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Algorithms & data structures.
|
|
Computer networking & communications.
|
|
Information technology: general issues.
|
|
Computer security.
|
|
Computers -- Information Theory.
|
|
Computers -- Networking -- General.
|
|
Computers -- Social Aspects -- Human-Computer Interaction.
|
|
Computers -- Security -- General.
|
|
Computer networks -- Security measures
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Conti, Mauro (Associate professor), editor.
|
|
Zhou, Jianying, editor
|
|
Casalicchio, Emiliano, editor
|
|
Spognardi, Angelo, editor
|
ISBN |
303057878X |
|
9783030578787 |