LEADER 07266nam 22007815 450 001 996465770203316 005 20210430144802.0 010 $a3-642-33383-4 024 7 $a10.1007/978-3-642-33383-5 035 $a(CKB)3400000000086206 035 $a(SSID)ssj0000767529 035 $a(PQKBManifestationID)11941723 035 $a(PQKBTitleCode)TC0000767529 035 $a(PQKBWorkID)10739781 035 $a(PQKB)10483721 035 $a(DE-He213)978-3-642-33383-5 035 $a(MiAaPQ)EBC3069937 035 $a(PPN)168324318 035 $a(EXLCZ)993400000000086206 100 $a20120906d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security$b[electronic resource] $e15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings /$fedited by Dieter Gollmann, Felix C. Freiling 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIV, 402 p. 87 illus.) 225 1 $aSecurity and Cryptology ;$v7483 300 $aInternational conference proceedings. 311 $a3-642-33382-6 320 $aIncludes bibliographical references and author index. 327 $aPrivacy-Preserving Speaker Authentication.- Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks -- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data.  Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks -- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data. . 330 $aThis book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation. 410 0$aSecurity and Cryptology ;$v7483 606 $aSeguridad informática 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aSpecial purpose computers 606 $aComputers and civilization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aMath Applications in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17044 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 04$aSeguridad informática 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aSpecial purpose computers. 615 0$aComputers and civilization. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aMath Applications in Computer Science. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputers and Society. 676 $a005.8 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFreiling$b Felix C$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aISC (Conference : Information security) 906 $aBOOK 912 $a996465770203316 996 $aInformation Security$9771885 997 $aUNISA