Description |
1 online resource (xiv, 466 pages) : illustrations |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 8128 |
|
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI |
|
Lecture notes in computer science ; 8128, 0302-9743
|
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
|
Contents |
Modern Cryptography. Symmetric-Key Cryptography. Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock / Jiageng Chen, Atsuko Miyaji -- Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions / Asato Kubai, Junji Shikata, Yohei Watanabe -- On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography / Kishan Chand Gupta, Indranil Ghosh Ray |
|
Public-Key Cryptography. Code-Based Public-Key Encryption Resistant to Key Leakage / Edoardo Persichetti -- Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics / Masaya Yasuda [and others] |
|
Koshiba Algorithmic Cryptanalysis. A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images / Abdel Alim Kamal, Roger Zahno, Amr M. Youssef -- Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method / Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann -- On the Security of LBlock against the Cube Attack and Side Channel Cube Attack / Saad Islam, Mehreen Afzal, Adnan Rashdi |
|
Security Engineering. Software and Hardware Implementation of Cryptographic Algorithms. Code-Based Identification and Signature Schemes in Software / Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani -- Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine / Danilo Câmara [and others] -- Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves / Gerwin Gsenger, Christian Hanser -- Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves / Christian Hanser, Christian Wagner |
|
Database Encryption. Cumulus4j: A Provably Secure Database Abstraction Layer / Matthias Huber [and others] -- Interaction between Cryptographic Theory and Implementation Issues. Optimal Parameters for XMSS MT / Andreas Hülsing, Lea Rausch, Johannes Buchmann -- Solving the Discrete Logarithm Problem for Packing Candidate Preferences / James Heather [and others] -- SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences / Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen |
|
Cyber Security and Dependability. Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace / Clara Maria Colombini [and others] -- Analyzing the Internet Stability in Presence of Disasters / Francesco Palmieri [and others] -- Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project / Thomas Schaberreiter [and others] -- How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function / Wolfgang Boehmer -- Using Probabilistic Analysis for the Certification of Machine Control Systems / Atif Mashkoor, Osman Hasan, Wolfgang Beer -- Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms / Suliman A. Alsuhibany [and others] |
|
Network Security and Privacy. A Multiple-Key Management Scheme in Wireless Sensor Networks / Jung-Chun Liu [and others] -- VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment / Igor Kotenko, Evgenia Novikova -- A Denial of Service Attack to GSM Networks via Attach Procedure / Nicola Gobbo, Alessio Merlo, Mauro Migliardi -- PPM: Privacy Policy Manager for Personalized Services / Shinsaku Kiyomoto [and others] -- An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks / Bo Liu [and others] |
|
Multimedia Technology for Homeland Defense. Intelligent UBMSS Systems for Strategic Information Management / Lidia Ogiela, Marek R. Ogiela -- Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness / Arcangelo Castiglione [and others] -- Computer Karate Trainer in Tasks of Personal and Homeland Security Defense / Tomasz Hachaj, Marek R. Ogiela -- Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios / Francesco Flammini [and others] -- A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process / Vaise Patu, Shuichiro Yamamoto |
Summary |
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense |
Notes |
International conference proceedings |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed August 20, 2013) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer networks.
|
|
Computer security.
|
|
Computer Communication Networks
|
|
Computer Security
|
|
Computer security
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Cuzzocrea, Alfredo, 1974- editor.
|
|
MoCrySEn 2013 (2013 : Regensburg, Germany)
|
|
SeCIHD 2013 (2013 : Regensburg, Germany)
|
ISBN |
9783642405884 |
|
3642405886 |
|