Description |
1 online resource (769 pages) |
Series |
Lecture Notes in Computer Science ; 12309 |
|
LNCS sublibrary, SL 4, Security and cryptology |
|
Lecture notes in computer science ; 12309.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro -- Preface -- Organization -- Keynotes -- Decentralising Information and Communications Technology: Paradigm Shift or Cypherpunk Reverie? -- Lattices and Zero-Knowledge -- Accountability in Computing -- Contents -- Part II -- Contents -- Part I -- Formal Modelling -- Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols -- 1 Introduction -- 2 Overview -- 3 Tamarin Syntax and Semantics -- 3.1 Term Algebra -- 3.2 Transition System -- 3.3 Execution Traces -- 3.4 Properties -- 4 Automatically Generated Sources Lemmas -- 4.1 Definitions |
|
4.2 Algorithm -- 4.3 Dealing with Composed Rules -- 5 Implementation and Experimental Evaluation -- 6 Conclusion -- A Proofs of Theorems 1 and 2 -- References -- When Is a Test Not a Proof? -- 1 Introduction -- 1.1 Addressing the Problem -- 1.2 Our Contribution -- 2 The Jakobsson-Juels PET -- 2.1 Plaintext Equivalence Test -- 2.2 Why the PET Is Not a Proof -- 3 Flaws in a Practical Implementation of the PEP -- 3.1 Use of Zero Knowledge Proofs (ZKPs) -- 3.2 Making Equivalent Ciphertexts Look Different -- 3.3 Making Encryptions of Different Messages Look Equivalent |
|
3.4 Summary and Implications of These Vulnerabilities -- 4 Why this Undermines Universal Verifiability in JCJ/Civitas and Other Protocols -- 4.1 JCJ/Civitas -- 4.2 A Linear-Time Enhancement to JCJ -- 4.3 Introduction to Cryptography Textbook -- 4.4 Pretty Good Democracy -- 4.5 Selections -- 4.6 Cobra -- 4.7 Caveat Coercitor -- 4.8 Universally Verifiable Auctions -- 5 Correcting the Problems to Achieve UV -- 5.1 The Fiat-Shamir Transform -- 5.2 The Correct Plaintext Equivalence Proof -- 5.3 Security Proof for the Corrected PEP -- 6 Discussion and Conclusion -- References |
|
Hardware Fingerprinting for the ARINC 429 Avionic Bus -- 1 Introduction -- 1.1 Background -- 1.2 Related Work -- 1.3 Contributions -- 2 Preliminaries -- 2.1 The ARINC 429 Standard -- 2.2 The Adversary Model -- 3 The Data Set -- 4 The Hardware Fingerprinting Approach -- 4.1 IDS Overview -- 4.2 Anomaly Detection per Segment -- 4.3 Voting -- 4.4 Suspicion Counter -- 5 Signal Segmentation -- 6 Feature Sets -- 7 Detection Based on a Single Word -- 7.1 Methodology -- 7.2 Identifying a Rogue Transmitter -- 8 Modeling the Suspicion Counter -- 9 Performance of the Complete Method -- 10 Conclusions |
Summary |
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain |
Notes |
International conference proceedings |
|
"Due to the global COVID-19 pandemic, the conference and workshops ran virtually, hosted by the University of Surrey, UK."--Preface |
Bibliography |
References-Applied Cryptography I-Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition-1 Introduction-1.1 Background-1.2 Our Contribution-1.3 Related Work-2 Preliminaries-2.1 Identity-Based Key Encapsulation Mechanism-2.2 Security Definitions for IB-KEM-3 Simulation-Based Definition of Anonymity-3.1 Defining Ano-SS for IB-KEM-3.2 Proof that Ano-SS Implies Ano-LOR-4 Equivalence Between Ano-LOR and Ano-SS-5 Discussion |
Notes |
A Attempt to Define Anonymity Based on Goldwasser and Micali's Approach |
|
Print version record |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Application software.
|
|
Software engineering.
|
|
Network security.
|
|
Network hardware.
|
|
Information retrieval.
|
|
Expert systems -- knowledge-based systems.
|
|
Software Engineering.
|
|
Computer security.
|
|
Computers -- Networking -- Security.
|
|
Computers -- Hardware -- Network Hardware.
|
|
Computers -- Information Technology.
|
|
Computers -- Expert Systems.
|
|
Computers -- Software Development & Engineering -- General.
|
|
Computers -- Security -- General.
|
|
Application software
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Software engineering
|
Genre/Form |
Electronic books
|
|
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Chen, Liqun
|
|
Li, Ninghui (Computer scientist)
|
|
Liang, Kaitai
|
|
Schneider, S. A. (Steve A.)
|
ISBN |
9783030590130 |
|
3030590135 |