Applications and Techniques in Information Security : 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings / / edited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XI, 313 p. 157 illus., 101 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Computers—Law and legislation Information technology—Law and legislation Artificial intelligence Application software Computer networks Data and Information Security Legal Aspects of Computing Artificial Intelligence Computer and Information Systems Applications Computer Communication Networks |
ISBN | 981-15-0871-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. . |
Record Nr. | UNINA-9910357850203321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings / / edited by Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, Gang Li |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 223 p. 65 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data mining Artificial intelligence Data encryption (Computer science) Systems and Data Security Data Mining and Knowledge Discovery Artificial Intelligence Cryptology |
ISBN | 981-13-2907-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Security -- Information Abuse Prevention -- Security Implementations -- Knowledge Discovery -- Applications. |
Record Nr. | UNINA-9910299295503321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings / / edited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 223 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Algorithms Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 981-10-5421-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security. |
Record Nr. | UNINA-9910254820103321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings / / edited by Lynn Batten, Gang Li |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVI, 163 p. 30 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Algorithms Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 981-10-2741-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited speeches -- Attacks on data security systems -- Detection of attacks on data security systems -- Data security -- Data privacy. |
Record Nr. | UNINA-9910254987403321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings / / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVII, 398 p. 147 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Algorithms Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 3-662-48683-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Invited Speeches -- Memory Scrapper Attacks - Threats and Mitigations -- A Simple and Provable Secure (Authenticated) Key Exchange Based on LWE -- Contents -- Cryptograph -- An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map -- Abstract -- 1 Introduction -- 2 Basic Theory of the Proposed Algorithm -- 2.1 Zigzag Transformation -- 2.2 3-Dimension Logistic Chaotic Map -- 3 Algorithm Described -- 4 Simulation Result -- 5 The Security Analysis -- 5.1 Resistance to Exhaustive Attack -- 5.1.1 Analysis of Key Space -- 5.1.2 Keys' Sensitivity Analysis -- 5.2 Resistance to Statistical Attack -- 5.2.1 The Grey Histogram Analysis -- 5.2.2 Correlation Coefficient Analysis -- 5.3 Information Entropy Analysis -- 5.4 Compare the Efficiency of Encryption and Decryption -- 6 Conclusion -- Acknowledgements -- References -- An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme -- 1 Introduction -- 2 Preliminaries -- 3 Security Analysis of Liang et al.'s CR-IB-PRE Scheme -- 4 Syntax and Security Definition for CR-IB-PRE Scheme -- 5 Our Improved CR-IB-PRE Scheme -- 6 Security and Efficiency Analysis -- 7 Conclusion -- References -- Cryptographic Public Key Length Prediction -- Abstract -- 1 Introduction -- 2 Key Length Prediction -- 2.1 Lenstra and Verheul Equations -- 2.2 Lenstra Update Equations -- 2.3 The Network Working Group RFC3766 -- 2.4 ECRYPT and ECRYPT II -- 2.5 Nist -- 2.6 Anssi -- 2.7 BSI -- 3 Moore's Law -- 4 Experiments and Environment -- 5 Summary and Conclusions -- References -- An Image Encryption Algorithm Based on Chua's Chaos and Baker's Transformation -- 1 Introduction -- 2 Chaos Theory -- 3 Baker's Transformation -- 4 Encryption Methodology -- 5 Experimental Results and Analysis -- 5.1 Experimental Results -- 5.2 Experimental Analysis.
6 Conclusion -- References -- Quantum Differential Cryptanalysis to the Block Ciphers -- 1 Introduction -- 2 Preliminaries -- 2.1 Classical Differential Cryptanalysis -- 2.2 The Bernstein--Vazirani Algorithm -- 2.3 Results After Running the Bernstein--Vazirani Algorithm -- 3 Quantum Algorithm to Execute Differential Cryptanalysis -- 3.1 The First Method -- 3.2 The Second Method -- 4 Discussions and Conclusions -- References -- An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes o ... -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 VPN -- 2.2 Platform Security Attributes -- 2.3 Attribute Based Encryption -- 3 Problem Definition -- 3.1 Our Goals -- 3.2 Threat Model and Assumptions -- 4 Design -- 4.1 Authentication Scheme Overview -- 4.2 Platform Attributes Extraction -- 4.3 Security Requirements Classification -- 5 Implementation -- 5.1 Platform Attributes Expression -- 5.2 Remote Authentication Framework -- 5.3 ABE Based Authentication -- 5.4 Trusted Computing Based Attributes -- 6 Analysis -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Conclusion -- References -- Public Key Timed-Release Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 1.3 Organization -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Complexity Assumptions -- 3 PKTRABE: Definitions -- 4 Construction 1: Single Time Server -- 4.1 Description of the Scheme -- 4.2 Security of the Scheme -- 5 Construction 2: Multiple Time Servers -- 5.1 Description of the Scheme -- 5.2 Security of the Scheme -- 6 Conclusions and Future Work -- References -- Color Image Encryption in CIE L*a*b* Space -- 1 Introduction -- 2 Previous Work -- 3 Preliminaries -- 3.1 1D Logistic Map -- 3.2 2D Arnold's Cat Map -- 3.3 3D Lu Map -- 4 Color Image Encryption in L*a*b* -- 4.1 Color Conversion. 4.2 The L* Channel -- 4.3 The A* and B* Channel -- 5 Simulation Results -- 6 Security and Performance Analysis -- 6.1 Resistance to the Brute-Force Attack -- 6.2 Resistance to the Statistic Attack -- 6.3 The Speed of the Encryption and Decryption -- 7 Conclusion and Discussion -- References -- Evaluation, Standards and Protocols -- Discover Abnormal Behaviors Using HTTP Header Fields Measurement -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Discovery of Abnormal Behaviors -- 2.2 Automatic Discovery of Protocol Format -- 3 Methodology -- 4 Experiments and Results -- 4.1 Environment -- 4.2 The Basic Statistical Analysis of HTTP Header Field -- 4.3 The Mining Analysis of HTTP Header Field Order -- 4.4 Recognize Abnormal HTTP Flow -- 5 Conclusions -- Acknowledgements -- References -- Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis -- 1 Introduction -- 2 Overview of the OpenID Protocol -- 3 Modeling Protocols in TLA+ -- 3.1 General Flow -- 3.2 Protocol Specification -- 4 Experimental Results and Discussion -- 5 Defense Mechanisms -- 6 Conclusion -- References -- A Lightweight Code-Based Authentication Protocol for RFID Systems -- 1 Introduction -- 2 Related Work -- 3 Error Correction Code (ECC) -- 4 Our Proposed Protocol -- 4.1 QC-MDPC McEliece Encryption -- 4.2 Initialization -- 4.3 Authentication -- 5 Security Analysis -- 6 Performance Analysis -- 7 Conclusion -- References -- An Overview of Ad Hoc Network Security -- Abstract -- 1 Introduction -- 2 Existing Typical Schemes -- 2.1 Threshold Mechanism Schemes -- 2.2 Self-organized Mechanism Schemes -- 2.3 Id-Based Mechanism Schemes -- 2.4 Cluster-Based Mechanism Schemes -- 3 The Comparisons of Those Schemes -- 4 Further Study -- 4.1 A Bi-directional Trust Model -- 4.2 A Trust Model with Parameter -- 5 Conclusions -- References. Trust Computing and Privacy Protection -- Structural Analysis of IWA Social Network -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Basic Concept of IWA Social Network -- 3.2 IWA Social Network Construction -- 3.3 Community Detection Algorithm -- 4 Experiment -- 4.1 Data Setting -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- A Differentially Private Method for Reward-Based Spatial Crowdsourcing -- 1 Introduction -- 2 Related Work and Background -- 2.1 Related Work -- 2.2 Differential Privacy -- 3 Differentially Private Method -- 3.1 Problem Definition -- 3.2 Building Contour Plot with DP -- 3.3 Task Assignment -- 4 Experiments -- 4.1 Settings -- 4.2 Experiment Results and Comparisons -- 5 Conclusions -- References -- Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Data -- Abstract -- 1 Introduction and Motivations -- 2 Measurement Methodology -- 2.1 Overview of Data Sets -- 2.2 Measurement Metrics -- 2.3 Measurement Framework -- 3 Measurement Result -- 3.1 HTTP and HTTPS Performance -- 3.2 FTP Performance -- 3.3 SSH Performance -- 3.4 SMTP Performance -- 4 Conclusion and Future Works -- References -- Trust Prediction with Trust Antecedent Framework Regularization -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Matrix Factorization Model for Trust Prediction -- 4 Modeling Trust Antecedent Framework for Trust Prediction -- 4.1 Factors of Perceived Trustworthiness -- 4.2 The Proposed Framework: tafTrust -- 5 Experiments -- 5.1 Dataset -- 5.2 Evaluation Metrics -- 5.3 Comparison Methods and Details -- 5.4 Impact of Parameter gamma -- 6 Conclusion and Future Work -- Acknowledgments -- References -- Trust Prediction Based on Interactive Relations Strength -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Trust Prediction Framework. 3.1 Modeling Relational Strength in Fields -- 3.2 Trust Prediction Model -- 4 Experiments and Evaluation -- 4.1 Dataset and Evaluation Method -- 4.2 Comparison of Different Trust Predictors -- 5 Conclusions -- Acknowledgments -- References -- Cloud Security and Applications -- You Can't Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud -- Abstract -- 1 Introduction -- 2 Related Works -- 3 A Novel Methodology of Defending DDoS Attack Based on Botcloud -- 3.1 Identifying Attack Flows -- 3.2 Tracebacking Malicious Processes -- 4 Experiments and Analysis -- 4.1 Experimental Setting -- 4.2 Experimental Results and Analysis -- 5 Conclusion and Future Works -- References -- Quantitative Evaluation Method of Cloud Security -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Cloud Security Indicator System -- 3.1 Principles of Building of Indicator System -- 3.2 Architecture of the Indicator System -- 4 Quantitative Assessment of Cloud Security -- 4.1 Multi-attribute Decision Making Indicator System -- 4.2 Normalization of Decision-Making Index -- 4.3 Multi-attribute Decision-Making -- 5 Example of Quantitative Analysis -- 5.1 Security Evaluation Module -- 5.2 Quantization Evaluation -- 6 Summary -- References -- A Large-Scale Distributed Sorting Algorithm Based on Cloud Computing -- Abstract -- 1 Introduction -- 2 Construction of Large-Scale Distributed Sorting Platform -- 2.1 Business Logic Design -- 2.1.1 Business Logic Design of Host -- 2.1.2 Business Logic Design of Working Machine -- 3 Large-Scale Distributed Sorting Algorithm Design -- 3.1 Large-Scale Distributed Sorting Algorithm Design of Host -- 3.1.1 Data Distribution Based on Constraint of the Number of Working Machine -- 3.1.2 Task Distribution Based on Constraint of Free Time -- 3.2 Large-Scale Distributed Sorting Algorithm Design of Working Machine. 4 Implementation and Validation of Algorithm. |
Record Nr. | UNINA-9910298961303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings / / edited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 266 p. 120 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Systems and Data Security Cryptology |
ISBN | 3-662-45670-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations. |
Record Nr. | UNINA-9910298977603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computational Intelligence, Cyber Security and Computational Models : Proceedings of ICC3 2015 / / edited by Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (575 p.) |
Disciplina | 006 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Computer security Computer science—Mathematics Computer mathematics Artificial intelligence Computational Intelligence Systems and Data Security Mathematical Applications in Computer Science Artificial Intelligence |
ISBN | 981-10-0251-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I_Keynote Address: 1. The game of Wall Cops and Robbers -- 2. Smartphone Applications, Malware and Data Theft -- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation -- 4. Generating a Standardized Upper Ontology for Security of Information and Networks -- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC features for Speaker Recognition -- Chapter 2. Single-pixel Based Double Random-Phase Encoding Technique -- Chapter 3. Kernel Online Multi-task Learning -- Chapter 4. Performance Evaluation of Sentiment Classification Using Query Strategies in a Pool Based Active Learning Scenario -- Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks with Homogeneous Feature Distribution -- Chapter 6. Performance Analysis of ApEn as a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels from EEG Signals -- Chapter 7. Suspicious Human Activity Detection in Classroom Examination -- Chapter 8. H ∞ State Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements Using Second Order Reciprocal Convex Approach -- Chapter 9. A Fuzzy Methodology for Clustering Text Documents with Uncertain Spatial References -- Chapter 10. A Novel Feature Extraction Algorithm from Fingerprint Image in Wavelet Domain -- Chapter 11. Motor imagery Classification Based on Variable Precision Multigranulation Rough Set -- Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary Techniques -- Chapter 13. A Two Phase Approach for Efficient Clustering of Web Services -- Chapter 14. Elimination of Redundant Association Rules – An Efficient Linear Approach -- Chapter 15. Clustering Techniques from Significance Analysis of Microarrays -- Chapter 16. Breast Region Extraction and Pectoral Removal by Pixel Constancy Constraint approach in Mammograms -- Chapter 17. Bridging the Semantic Gap in Image Search via Visual Semantic Descriptors by Integrating Text and Visual Features -- Chapter 18. Adaptive Equalization Algorithm for Electrocardiogram Signal Transmission -- Chapter 19. An Efficient Approach for MapReduce Result Verification -- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary Computing Based Error Correction Coding -- Chapter 21. Comparison of Machine Learning Techniques for the Identification of the Stages of Parkinson's Disease -- Chapter 22. Security Constrained Unit Commitment Problem Employing Artificial Computational Intelligence for Wind-thermal Power System -- Chapter 23. Human Gait Recognition Using Fuzzy Logic -- Chapter 24. Detection and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram Sequences Analysis -- Chapter 25. An Elitist Genetic Algorithm Based Extreme Learning Machine -- Chapter 26. Formulation and Enhancement of User Adaptive Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine -- Part III_Cyber Security: Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server Authenticated Key Agreement Scheme -- Chapter 28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems -- Chapter 29. Implementation of ECDSA Using Sponge Based Hash Function -- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on Perfect Reconstruction of White Pixels and Additional Basis Matrix -- Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-verifier for Digital Goods Providers -- Chapter 32. Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation -- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions -- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques -- Chapter 35. K out of N Secret Sharing Scheme with Steganography and Authentication -- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in Military Based Mobile Ad-hoc Networks Using Stereotypes -- Chapter 37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key Management -- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of Data in Mobile Ad-hoc Networks -- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage in Cloud Computing -- Part IV_Computational Models: Chapter 40. A Study on Building Seamless Communication Among Vehicles in Vanet Using the Integrated Agent Communication Model (IACM) -- Chapter 41. A Hybrid Approach for Data Hiding through Chaos Theory and Reversible Integer Mapping -- Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model -- Chapter 43. An Effective Tool for optimizing the Number of Test Paths in Data Flow Testing for Anomaly Detection -- Chapter 44. Venus Flytrap Optimization -- Chapter 45. Zumkeller Cordial Labeling of Graphs -- Chapter 46. Cuckoo Based Resource Allocation for Mobile Cloud Environments -- Chapter 47. Transient Analysis of an M/M/c Queue Subject to Multiple Exponential Vacation -- Chapter 48. Fractional Filter Based Internal Model Controller for Nonlinear Process -- Chapter 49. A Novel Method for Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance Property and Oddment Method. |
Record Nr. | UNINA-9910254198403321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Privacy [[electronic resource] ] : 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings / / edited by Lynn Batten, Reihaneh Safavi-Naini |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 446 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Operating systems (Computers) Computer communication systems Coding theory Information theory Algorithms Cryptology Management of Computing and Information Systems Operating Systems Computer Communication Networks Coding and Information Theory Algorithm Analysis and Problem Complexity |
ISBN | 3-540-35459-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Stream Ciphers -- Algebraic Attacks on Clock-Controlled Stream Ciphers -- Cache Based Power Analysis Attacks on AES -- Distinguishing Attack on SOBER-128 with Linear Masking -- Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks -- Symmetric Key Ciphers -- Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond -- Improved Cryptanalysis of MAG -- On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions -- Network Security -- Augmented Certificate Revocation Lists -- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security -- Towards an Invisible Honeypot Monitoring System -- Cryptographic Applications -- Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service -- Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages -- More on Stand-Alone and Setup-Free Verifiably Committed Signatures -- Secure Implementation -- API Monitoring System for Defeating Worms and Exploits in MS-Windows System -- Hiding Circuit Topology from Unbounded Reverse Engineers -- The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications -- Signatures -- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption -- Efficient Identity-Based Signatures Secure in the Standard Model -- Event-Oriented k-Times Revocable-iff-Linked Group Signatures -- Key Replacement Attack Against a Generic Construction of Certificateless Signature -- Theory -- A Novel Range Test -- Efficient Primitives from Exponentiation in ? p -- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity -- Statistical Decoding Revisited -- Invited Talk -- Towards Provable Security for Ubiquitous Applications -- Security Applications -- Oblivious Scalar-Product Protocols -- On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases -- Provable Security -- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles -- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT -- Tag-KEM from Set Partial Domain One-Way Permutations -- Protocols -- An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys -- Graphical Representation of Authorization Policies for Weighted Credentials -- Secure Cross-Realm C2C-PAKE Protocol -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction -- Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant -- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. |
Record Nr. | UNISA-996465754903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Privacy [[electronic resource] ] : 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings / / edited by Lynn Batten, Jennifer Seberry |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (XII, 516 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Operating systems (Computers) Computer communication systems Algorithms Computers and civilization Cryptology Management of Computing and Information Systems Operating Systems Computer Communication Networks Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-540-45450-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key Handling -- A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields -- Security Analysis and Improvement of the Global Key Recovery System -- The LILI-II Keystream Generator -- A Secure Re-keying Scheme with Key Recovery Property -- Trust and Secret Sharing -- Modelling Trust Structures for Public Key Infrastructures -- Size of Broadcast in Threshold Schemes with Disenrollment -- Requirements for Group Independent Linear Threshold Secret Sharing Schemes -- Efficient Sharing of Encrypted Data -- Cheating Prevention in Linear Secret Sharing -- Fast Computation -- Note on Fast Computation of Secret RSA Exponents -- Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying -- Cryptanalysis I -- Cryptanalysis of Stream Cipher COS (2, 128) Mode I -- The Analysis of Zheng-Seberry Scheme -- Cryptanalysis of Stream Cipher Alpha1 -- A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem -- Elliptic Curves -- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over -- Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems -- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis -- AES -- Strengthening the Key Schedule of the AES -- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes -- Security Management -- Security Management: An Information Systems Setting -- Resolving Conflicts in Authorization Delegations -- Policy Administration Domains -- Authentication -- Maintaining the Validity of Digital Signatures in B2B Applications -- Short 3-Secure Fingerprinting Codes for Copyright Protection -- An Order-Specified Multisignature Scheme Secure against Active Insider Attacks -- Authenticated Operation of Open Computing Devices -- A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem -- Invited Talk -- A Brief Outline of Research on Correlation Immune Functions -- Oblivious Transfer -- m out of n Oblivious Transfer -- Cryptanalysis II -- On the Security of Reduced Versions of 3-Pass HAVAL -- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling -- On the Security of a Modified Paillier Public-Key Primitive -- Dealing with Adversaries -- How to Play Sherlock Holmes in the World of Mobile Agents -- A Practical Approach Defeating Blackmailing -- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing -- Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. |
Record Nr. | UNISA-996465377003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Privacy : 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings / / edited by Lynn Batten, Jennifer Seberry |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (XII, 516 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Operating systems (Computers) Computer networks Algorithms Computers and civilization Cryptology Management of Computing and Information Systems Operating Systems Computer Communication Networks Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-540-45450-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key Handling -- A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields -- Security Analysis and Improvement of the Global Key Recovery System -- The LILI-II Keystream Generator -- A Secure Re-keying Scheme with Key Recovery Property -- Trust and Secret Sharing -- Modelling Trust Structures for Public Key Infrastructures -- Size of Broadcast in Threshold Schemes with Disenrollment -- Requirements for Group Independent Linear Threshold Secret Sharing Schemes -- Efficient Sharing of Encrypted Data -- Cheating Prevention in Linear Secret Sharing -- Fast Computation -- Note on Fast Computation of Secret RSA Exponents -- Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying -- Cryptanalysis I -- Cryptanalysis of Stream Cipher COS (2, 128) Mode I -- The Analysis of Zheng-Seberry Scheme -- Cryptanalysis of Stream Cipher Alpha1 -- A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem -- Elliptic Curves -- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over -- Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems -- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis -- AES -- Strengthening the Key Schedule of the AES -- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes -- Security Management -- Security Management: An Information Systems Setting -- Resolving Conflicts in Authorization Delegations -- Policy Administration Domains -- Authentication -- Maintaining the Validity of Digital Signatures in B2B Applications -- Short 3-Secure Fingerprinting Codes for Copyright Protection -- An Order-Specified Multisignature Scheme Secure against Active Insider Attacks -- Authenticated Operation of Open Computing Devices -- A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem -- Invited Talk -- A Brief Outline of Research on Correlation Immune Functions -- Oblivious Transfer -- m out of n Oblivious Transfer -- Cryptanalysis II -- On the Security of Reduced Versions of 3-Pass HAVAL -- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling -- On the Security of a Modified Paillier Public-Key Primitive -- Dealing with Adversaries -- How to Play Sherlock Holmes in the World of Mobile Agents -- A Practical Approach Defeating Blackmailing -- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing -- Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. |
Record Nr. | UNINA-9910143899503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|