Description |
1 online resource (xiv, 572 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 7954 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7954. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Cloud Cryptography. Transparent, Distributed, and Replicated Dynamic Provable Data Possession / Mohammad Etemad, Alptekin Küpçü -- Client-Controlled Cryptography-as-a-Service in the Cloud / Sören Bleikertz [and others] -- CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing / Yi-Ruei Chen [and others] -- Computing on Authenticated Data for Adjustable Predicates / Björn Deiseroth [and others] -- Secure Computation. Towards Efficient Private Distributed Computation on Unbounded Input Streams / Shlomi Dolev [and others] -- From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting / Sven Laur, Riivo Talviste, Jan Willemson -- Private Database Queries Using Somewhat Homomorphic Encryption / Dan Boneh [and others] -- Hash Function and Block Cipher. BLAKE2: Simpler, Smaller, Fast as MD5 / Jean-Philippe Aumasson [and others] |
|
Cryptophia's Short Combiner for Collision-Resistant Hash Functions / Arno Mittelbach -- Generic Attacks for the Xor of k Random Permutations / Jacques Patarin -- Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist / Yu Sasaki -- Signature. Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles / Xiangxue Li [and others] -- Sequential Aggregate Signatures Made Shorter / Kwangsu Lee, Dong Hoon Lee, Moti Yung -- Group-Oriented Cryptography. How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE / Rikke Bendlin, Sara Krehbiel, Chris Peikert -- Toward Practical Group Encryption / Laila El Aimani, Marc Joye -- System Attack I. Experimental Analysis of Attacks on Next Generation Air Traffic Communication / Matthias Schäfer, Vincent Lenders, Ivan Martinovic -- Launching Generic Attacks on iOS with Approved Third-Party Applications / Jin Han [and others] |
|
Secure Implementation -- Hardware. Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography / Erich Wenger -- Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors / Michael Henson, Stephen Taylor -- Secure Implementation -- Software. NEON Implementation of an Attribute-Based Encryption Scheme / Ana Helena Sánchez, Francisco Rodríguez-Henríquez -- Fast and Maliciously Secure Two-Party Computation Using the GPU / Tore Kasper Frederiksen, Jesper Buus Nielsen -- Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves / Aurore Guillevic -- System Attack II. FROST / Tilo Müller, Michael Spreitzenbarth -- Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware / Alexander Wild, Tim Güneysu, Amir Moradi -- Keystroke Timing Analysis of on-the-fly Web Apps / Chee Meng Tey [and others] |
|
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance / Marc Fischlin, Cristina Onete -- Group-Oriented Systems. CrowdShare: Secure Mobile Resource Sharing / N. Asokan [and others] -- Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System / Filip Zagórski [and others] -- Key Exchange and Leakage Resilience. Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles / Koutarou Suzuki, Kazuki Yoneyama -- Public Key Exchange Using Semidirect Product of (Semi)Groups / Maggie Habeeb [and others] -- Leakage Resilient IBE and IPE under the DLIN Assumption / Kaoru Kurosawa, Le Trieu Phong -- Cryptographic Proof. Batch Proofs of Partial Knowledge / Ryan Henry, Ian Goldberg -- Efficient Signatures of Knowledge and DAA in the Standard Model / David Bernhard, Georg Fuchsbauer, Essam Ghadafi -- Cryptosystems. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes / Olivier Blazy [and others] -- Primeless Factoring-Based Cryptography / Sonia Bogos, Ioana Boureanu, Serge Vaudenay |
Summary |
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data structures (Computer science) |
|
Data encryption (Computer science) |
|
Coding theory |
|
Information Systems |
|
Systems and Data Security |
|
Management of Computing and Information Systems |
|
Coding and Information Theory |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed July 3, 2013) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Cloud computing -- Congresses
|
|
Computer security.
|
|
Computer Communications Networks
|
|
Computer Security
|
|
Computer security
|
|
Cloud computing
|
|
Computer networks -- Security measures
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Jacobson, Michael (Computer scientist)
|
ISBN |
9783642389801 |
|
3642389805 |
|