Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008] |
Descrizione fisica | 1 online resource (XIII, 436 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Telecommunication systems - Security measures |
ISBN | 3-540-88625-7 |
Classificazione | 54.62 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat Modelling in User Performed Authentication -- Access with Fast Batch Verifiable Anonymous Credentials -- Side Channel Analysis -- Quantifying Timing Leaks and Cost Optimisation -- Method for Detecting Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box -- Analysis of Two Attacks on Reduced-Round Versions of the SMS4 -- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack -- Access Control -- Beyond User-to-User Access Control for Online Social Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application Confinement Policy Abstractions -- Towards Role Based Trust Management without Distributed Searching of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data -- Embedding Renewable Cryptographic Keys into Continuous Noisy Data -- Automated Device Pairing for Asymmetric Pairing Scenarios -- Applied Cryptography -- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0. -- Towards an Information Theoretic Analysis of Searchable Encryption -- A Bootstrap Attack on Digital Watermarks in the Frequency Domain -- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval -- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study -- Publicly Verifiable Remote Data Integrity. |
Record Nr. | UNISA-996466243503316 |
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008] |
Descrizione fisica | 1 online resource (XIII, 436 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Telecommunication systems - Security measures |
ISBN | 3-540-88625-7 |
Classificazione | 54.62 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat Modelling in User Performed Authentication -- Access with Fast Batch Verifiable Anonymous Credentials -- Side Channel Analysis -- Quantifying Timing Leaks and Cost Optimisation -- Method for Detecting Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box -- Analysis of Two Attacks on Reduced-Round Versions of the SMS4 -- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack -- Access Control -- Beyond User-to-User Access Control for Online Social Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application Confinement Policy Abstractions -- Towards Role Based Trust Management without Distributed Searching of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data -- Embedding Renewable Cryptographic Keys into Continuous Noisy Data -- Automated Device Pairing for Asymmetric Pairing Scenarios -- Applied Cryptography -- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0. -- Towards an Information Theoretic Analysis of Searchable Encryption -- A Bootstrap Attack on Digital Watermarks in the Frequency Domain -- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval -- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study -- Publicly Verifiable Remote Data Integrity. |
Record Nr. | UNINA-9910484185803321 |
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|