Security aspects in information technology : first international conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011 : proceedings / Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (eds.)
Machine generated contents note: Invited Talks -- Engineering Trustworthy Systems / Sanjay Burman -- Secure Implementations for the Internet of Things / Jorn-Marc Schmidt -- Embedded Security -- Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP / Alwyn R. Pais -- Security of Prime Field Pairing Cryptoprocessor against Differential Power Attack / Dipanwita Roychowdhury -- Embedded Software Security through Key-Based Control Flow Obfuscation / Swarup Bhunia -- Digital Rights Management -- Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform / Rajat Subhra Chakraborty -- Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture / Sourav Mukhopadhyay -- Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance / Ratna Dutta -- Cryptographic Protocols -- ID-Based Proxy Multi Signature Scheme without Bilinear Pairings / Sahadeo Padhye -- Distributed Signeryption Schemes with Formal Proof of Security / P.K. Saxena -- Identity Based Online/Offline Encryption and Signcryption Schemes Revisited / C. Pandu Rangan -- Cryptanalysis/Side Channel Attacks -- "Rank Correction": A New Side-Channel Approach for Secret Key Recovery / Jean-Luc Danger -- Cache Trace Attack on CAMELLIA / Chester Rebeiro -- Improvement of Linearization-Based Algebraic Attacks / Abhijit Das -- Cipher Primitives -- Generalized Avalanche Test for Stream Cipher Analysis / N.R. Pillai -- On Applications of Singular Matrices over Finite Fields in Cryptography / Wagish Shukla
Summary
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives
Analysis
Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
Bibliography
Includes bibliographical references and author index