Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings / / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVII, 398 p. 147 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Algorithms Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 3-662-48683-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Invited Speeches -- Memory Scrapper Attacks - Threats and Mitigations -- A Simple and Provable Secure (Authenticated) Key Exchange Based on LWE -- Contents -- Cryptograph -- An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map -- Abstract -- 1 Introduction -- 2 Basic Theory of the Proposed Algorithm -- 2.1 Zigzag Transformation -- 2.2 3-Dimension Logistic Chaotic Map -- 3 Algorithm Described -- 4 Simulation Result -- 5 The Security Analysis -- 5.1 Resistance to Exhaustive Attack -- 5.1.1 Analysis of Key Space -- 5.1.2 Keys' Sensitivity Analysis -- 5.2 Resistance to Statistical Attack -- 5.2.1 The Grey Histogram Analysis -- 5.2.2 Correlation Coefficient Analysis -- 5.3 Information Entropy Analysis -- 5.4 Compare the Efficiency of Encryption and Decryption -- 6 Conclusion -- Acknowledgements -- References -- An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme -- 1 Introduction -- 2 Preliminaries -- 3 Security Analysis of Liang et al.'s CR-IB-PRE Scheme -- 4 Syntax and Security Definition for CR-IB-PRE Scheme -- 5 Our Improved CR-IB-PRE Scheme -- 6 Security and Efficiency Analysis -- 7 Conclusion -- References -- Cryptographic Public Key Length Prediction -- Abstract -- 1 Introduction -- 2 Key Length Prediction -- 2.1 Lenstra and Verheul Equations -- 2.2 Lenstra Update Equations -- 2.3 The Network Working Group RFC3766 -- 2.4 ECRYPT and ECRYPT II -- 2.5 Nist -- 2.6 Anssi -- 2.7 BSI -- 3 Moore's Law -- 4 Experiments and Environment -- 5 Summary and Conclusions -- References -- An Image Encryption Algorithm Based on Chua's Chaos and Baker's Transformation -- 1 Introduction -- 2 Chaos Theory -- 3 Baker's Transformation -- 4 Encryption Methodology -- 5 Experimental Results and Analysis -- 5.1 Experimental Results -- 5.2 Experimental Analysis.
6 Conclusion -- References -- Quantum Differential Cryptanalysis to the Block Ciphers -- 1 Introduction -- 2 Preliminaries -- 2.1 Classical Differential Cryptanalysis -- 2.2 The Bernstein--Vazirani Algorithm -- 2.3 Results After Running the Bernstein--Vazirani Algorithm -- 3 Quantum Algorithm to Execute Differential Cryptanalysis -- 3.1 The First Method -- 3.2 The Second Method -- 4 Discussions and Conclusions -- References -- An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes o ... -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 VPN -- 2.2 Platform Security Attributes -- 2.3 Attribute Based Encryption -- 3 Problem Definition -- 3.1 Our Goals -- 3.2 Threat Model and Assumptions -- 4 Design -- 4.1 Authentication Scheme Overview -- 4.2 Platform Attributes Extraction -- 4.3 Security Requirements Classification -- 5 Implementation -- 5.1 Platform Attributes Expression -- 5.2 Remote Authentication Framework -- 5.3 ABE Based Authentication -- 5.4 Trusted Computing Based Attributes -- 6 Analysis -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Conclusion -- References -- Public Key Timed-Release Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 1.3 Organization -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Complexity Assumptions -- 3 PKTRABE: Definitions -- 4 Construction 1: Single Time Server -- 4.1 Description of the Scheme -- 4.2 Security of the Scheme -- 5 Construction 2: Multiple Time Servers -- 5.1 Description of the Scheme -- 5.2 Security of the Scheme -- 6 Conclusions and Future Work -- References -- Color Image Encryption in CIE L*a*b* Space -- 1 Introduction -- 2 Previous Work -- 3 Preliminaries -- 3.1 1D Logistic Map -- 3.2 2D Arnold's Cat Map -- 3.3 3D Lu Map -- 4 Color Image Encryption in L*a*b* -- 4.1 Color Conversion. 4.2 The L* Channel -- 4.3 The A* and B* Channel -- 5 Simulation Results -- 6 Security and Performance Analysis -- 6.1 Resistance to the Brute-Force Attack -- 6.2 Resistance to the Statistic Attack -- 6.3 The Speed of the Encryption and Decryption -- 7 Conclusion and Discussion -- References -- Evaluation, Standards and Protocols -- Discover Abnormal Behaviors Using HTTP Header Fields Measurement -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Discovery of Abnormal Behaviors -- 2.2 Automatic Discovery of Protocol Format -- 3 Methodology -- 4 Experiments and Results -- 4.1 Environment -- 4.2 The Basic Statistical Analysis of HTTP Header Field -- 4.3 The Mining Analysis of HTTP Header Field Order -- 4.4 Recognize Abnormal HTTP Flow -- 5 Conclusions -- Acknowledgements -- References -- Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis -- 1 Introduction -- 2 Overview of the OpenID Protocol -- 3 Modeling Protocols in TLA+ -- 3.1 General Flow -- 3.2 Protocol Specification -- 4 Experimental Results and Discussion -- 5 Defense Mechanisms -- 6 Conclusion -- References -- A Lightweight Code-Based Authentication Protocol for RFID Systems -- 1 Introduction -- 2 Related Work -- 3 Error Correction Code (ECC) -- 4 Our Proposed Protocol -- 4.1 QC-MDPC McEliece Encryption -- 4.2 Initialization -- 4.3 Authentication -- 5 Security Analysis -- 6 Performance Analysis -- 7 Conclusion -- References -- An Overview of Ad Hoc Network Security -- Abstract -- 1 Introduction -- 2 Existing Typical Schemes -- 2.1 Threshold Mechanism Schemes -- 2.2 Self-organized Mechanism Schemes -- 2.3 Id-Based Mechanism Schemes -- 2.4 Cluster-Based Mechanism Schemes -- 3 The Comparisons of Those Schemes -- 4 Further Study -- 4.1 A Bi-directional Trust Model -- 4.2 A Trust Model with Parameter -- 5 Conclusions -- References. Trust Computing and Privacy Protection -- Structural Analysis of IWA Social Network -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Basic Concept of IWA Social Network -- 3.2 IWA Social Network Construction -- 3.3 Community Detection Algorithm -- 4 Experiment -- 4.1 Data Setting -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- A Differentially Private Method for Reward-Based Spatial Crowdsourcing -- 1 Introduction -- 2 Related Work and Background -- 2.1 Related Work -- 2.2 Differential Privacy -- 3 Differentially Private Method -- 3.1 Problem Definition -- 3.2 Building Contour Plot with DP -- 3.3 Task Assignment -- 4 Experiments -- 4.1 Settings -- 4.2 Experiment Results and Comparisons -- 5 Conclusions -- References -- Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Data -- Abstract -- 1 Introduction and Motivations -- 2 Measurement Methodology -- 2.1 Overview of Data Sets -- 2.2 Measurement Metrics -- 2.3 Measurement Framework -- 3 Measurement Result -- 3.1 HTTP and HTTPS Performance -- 3.2 FTP Performance -- 3.3 SSH Performance -- 3.4 SMTP Performance -- 4 Conclusion and Future Works -- References -- Trust Prediction with Trust Antecedent Framework Regularization -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Matrix Factorization Model for Trust Prediction -- 4 Modeling Trust Antecedent Framework for Trust Prediction -- 4.1 Factors of Perceived Trustworthiness -- 4.2 The Proposed Framework: tafTrust -- 5 Experiments -- 5.1 Dataset -- 5.2 Evaluation Metrics -- 5.3 Comparison Methods and Details -- 5.4 Impact of Parameter gamma -- 6 Conclusion and Future Work -- Acknowledgments -- References -- Trust Prediction Based on Interactive Relations Strength -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Trust Prediction Framework. 3.1 Modeling Relational Strength in Fields -- 3.2 Trust Prediction Model -- 4 Experiments and Evaluation -- 4.1 Dataset and Evaluation Method -- 4.2 Comparison of Different Trust Predictors -- 5 Conclusions -- Acknowledgments -- References -- Cloud Security and Applications -- You Can't Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud -- Abstract -- 1 Introduction -- 2 Related Works -- 3 A Novel Methodology of Defending DDoS Attack Based on Botcloud -- 3.1 Identifying Attack Flows -- 3.2 Tracebacking Malicious Processes -- 4 Experiments and Analysis -- 4.1 Experimental Setting -- 4.2 Experimental Results and Analysis -- 5 Conclusion and Future Works -- References -- Quantitative Evaluation Method of Cloud Security -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Cloud Security Indicator System -- 3.1 Principles of Building of Indicator System -- 3.2 Architecture of the Indicator System -- 4 Quantitative Assessment of Cloud Security -- 4.1 Multi-attribute Decision Making Indicator System -- 4.2 Normalization of Decision-Making Index -- 4.3 Multi-attribute Decision-Making -- 5 Example of Quantitative Analysis -- 5.1 Security Evaluation Module -- 5.2 Quantization Evaluation -- 6 Summary -- References -- A Large-Scale Distributed Sorting Algorithm Based on Cloud Computing -- Abstract -- 1 Introduction -- 2 Construction of Large-Scale Distributed Sorting Platform -- 2.1 Business Logic Design -- 2.1.1 Business Logic Design of Host -- 2.1.2 Business Logic Design of Working Machine -- 3 Large-Scale Distributed Sorting Algorithm Design -- 3.1 Large-Scale Distributed Sorting Algorithm Design of Host -- 3.1.1 Data Distribution Based on Constraint of the Number of Working Machine -- 3.1.2 Task Distribution Based on Constraint of Free Time -- 3.2 Large-Scale Distributed Sorting Algorithm Design of Working Machine. 4 Implementation and Validation of Algorithm. |
Record Nr. | UNINA-9910298961303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings / / edited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 266 p. 120 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Systems and Data Security Cryptology |
ISBN | 3-662-45670-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations. |
Record Nr. | UNINA-9910298977603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|