top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Availability, Reliability, and Security in Information Systems [[electronic resource] ] : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings / / edited by Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar Weippl
Availability, Reliability, and Security in Information Systems [[electronic resource] ] : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings / / edited by Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar Weippl
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 267 p. 88 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Computer security
Information storage and retrieval
Data encryption (Computer science)
E-commerce
Information technology
Business—Data processing
Information Systems Applications (incl. Internet)
Systems and Data Security
Information Storage and Retrieval
Cryptology
e-Commerce/e-business
IT in Business
ISBN 3-319-45507-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465319903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings / / edited by Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar Weippl
Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings / / edited by Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar Weippl
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 267 p. 88 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Computer security
Information storage and retrieval
Data encryption (Computer science)
E-commerce
Information technology
Business—Data processing
Information Systems Applications (incl. Internet)
Systems and Data Security
Information Storage and Retrieval
Cryptology
e-Commerce/e-business
IT in Business
ISBN 3-319-45507-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484832103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Availability, Reliability, and Security in Information Systems [[electronic resource] ] : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings / / edited by Stephanie Teufel, Tjoa A Min, Illsun You, Edgar Weippl
Availability, Reliability, and Security in Information Systems [[electronic resource] ] : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings / / edited by Stephanie Teufel, Tjoa A Min, Illsun You, Edgar Weippl
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 311 p. 111 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Computer security
Biometrics (Biology)
Algorithms
Information Systems Applications (incl. Internet)
Systems and Data Security
Biometrics
Algorithm Analysis and Problem Complexity
ISBN 3-319-10975-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Knowledge Management -- Software Security -- Mobile and Social Computing -- Security and Cognitive Informatics -- Homeland Defense.
Record Nr. UNISA-996202525803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings / / edited by Stephanie Teufel, Tjoa A Min, Illsun You, Edgar Weippl
Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings / / edited by Stephanie Teufel, Tjoa A Min, Illsun You, Edgar Weippl
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 311 p. 111 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Computer security
Biometrics (Biology)
Algorithms
Information Systems Applications (incl. Internet)
Systems and Data Security
Biometrics
Algorithm Analysis and Problem Complexity
ISBN 3-319-10975-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Knowledge Management -- Software Security -- Mobile and Social Computing -- Security and Cognitive Informatics -- Homeland Defense.
Record Nr. UNINA-9910483637303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Availability, Reliability, and Security in Information Systems and HCI [[electronic resource] ] : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings / / edited by Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu
Availability, Reliability, and Security in Information Systems and HCI [[electronic resource] ] : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings / / edited by Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 504 p. 156 illus.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Computer security
Information storage and retrieval
Data encryption (Computer science)
E-commerce
Information technology
Business—Data processing
Information Systems Applications (incl. Internet)
Systems and Data Security
Information Storage and Retrieval
Cryptology
e-Commerce/e-business
IT in Business
ISBN 3-642-40511-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Economic, ethical, legal, multilingual, organizational and social aspects -- Context-oriented information integration -- Data/information management as a service -- Context-oriented information integration and location-aware computing -- Security and privacy -- Risk management and business continuity -- Security and privacy and location based applications.
Record Nr. UNISA-996465964103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Availability, Reliability, and Security in Information Systems and HCI : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings / / edited by Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu
Availability, Reliability, and Security in Information Systems and HCI : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings / / edited by Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 504 p. 156 illus.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Computer security
Information storage and retrieval
Data encryption (Computer science)
E-commerce
Information technology
Business—Data processing
Information Systems Applications (incl. Internet)
Systems and Data Security
Information Storage and Retrieval
Cryptology
e-Commerce/e-business
IT in Business
ISBN 3-642-40511-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Economic, ethical, legal, multilingual, organizational and social aspects -- Context-oriented information integration -- Data/information management as a service -- Context-oriented information integration and location-aware computing -- Security and privacy -- Risk management and business continuity -- Security and privacy and location based applications.
Record Nr. UNINA-9910483835303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blocks and Chains [[electronic resource] ] : Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms / / by Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl
Blocks and Chains [[electronic resource] ] : Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms / / by Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl
Autore Judmayer Aljosha
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 109 p.)
Disciplina 005.8
Collana Synthesis Lectures on Information Security, Privacy, and Trust
Soggetto topico Blockchains (Databases)
Data protection
Data protection—Law and legislation
Cryptography
Data encryption (Computer science)
Blockchain
Data and Information Security
Privacy
Cryptology
ISBN 3-031-02352-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Acknowledgments -- Introduction -- Background -- History of Cryptographic Currencies -- Bitcoin -- Coin Management Tools -- Nakamoto Consensus -- Conclusion and Open Challenges -- Bibliography -- Authors' Biographies.
Record Nr. UNINA-9910795641603321
Judmayer Aljosha  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blocks and Chains : Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms / / by Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl
Blocks and Chains : Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms / / by Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl
Autore Judmayer Aljosha
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 109 p.)
Disciplina 005.8
Collana Synthesis Lectures on Information Security, Privacy, and Trust
Soggetto topico Blockchains (Databases)
Data protection
Data protection—Law and legislation
Cryptography
Data encryption (Computer science)
Blockchain
Data and Information Security
Privacy
Cryptology
ISBN 3-031-02352-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Acknowledgments -- Introduction -- Background -- History of Cryptographic Currencies -- Bitcoin -- Coin Management Tools -- Nakamoto Consensus -- Conclusion and Open Challenges -- Bibliography -- Authors' Biographies.
Record Nr. UNINA-9910822888603321
Judmayer Aljosha  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security -- ESORICS 2015 [[electronic resource] ] : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II / / edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
Computer Security -- ESORICS 2015 [[electronic resource] ] : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II / / edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVII, 665 p. 124 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-24177-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Organization -- Contents - Part II -- Contents - Part I -- Privacy -- FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting -- 1 Introduction -- 2 Related Work -- 2.1 Fingerprinting -- 2.2 Countermeasures -- 3 Determining the Fingerprint Surface -- 3.1 Limitations of Preventing Fingerprint Tracking -- 3.2 Fingerprint Vectors -- 3.3 Fingerprint Surface -- 4 Design -- 4.1 Balancing Usability vs. Privacy -- 4.2 Generating Web Identities -- 5 Development and Implementation -- 5.1 Development -- 5.2 Implementation -- 6 Experiments and Validation -- 7 Conclusions -- References -- Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections -- 1 Introduction -- 2 Background and Adversary Model -- 2.1 IME and Personalized User Dictionary -- 2.2 Adversary Model -- 3 Vulnerability Analysis -- 3.1 Android KeyEvent Processing Flow -- 3.2 Cross-App KeyEvent Injection Vulnerability -- 4 Attack -- 4.1 Enumerating Entries from Dictionary -- 4.2 Attack in Stealthy Mode -- 4.3 Case Study of IMEs for Non-Latin Languages -- 5 Evaluation -- 5.1 Scope of Attack -- 5.2 Experiment on Word Completion Attack Mode -- 5.3 Experiment on Next-Word Prediction Attack Mode -- 6 Defense -- 7 Related Works -- 8 Conclusion -- References -- Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 4 Notations and Definitions -- 5 Our Proposed Schemes -- 5.1 Main Scheme -- 5.2 Dynamic Scheme -- 6 Security Analysis -- 7 Implementation and Evaluation -- 8 Conclusion -- A Definition of Locality-Sensitive Hashing -- B Simulation-Based Security Definition -- C Security Proofs -- D Comparison with Prior Work -- E Bandwidth Consumption Switch Appendix D with Appendix E -- References -- Privacy-Preserving Link Prediction in Decentralized Online Social Networks.
1 Introduction -- 2 Related Work -- 3 System Model and Privacy Goals -- 3.1 Network Abstraction -- 3.2 Training Goal -- 3.3 Prediction Goal -- 4 Methodology -- 4.1 ADMM -- 4.2 Two-Tier Training -- 4.3 Complexity Analysis -- 4.4 Protecting Prior Knowledge -- 5 Experimentation and Evaluation -- 5.1 Wikipedia RfA Dataset -- 5.2 Experimental Setup -- 5.3 Evaluation Metrics -- 5.4 Results -- 6 Conclusion -- A Appendix: Link Reconstruction Attack -- A.1 Experimental Setup -- A.2 Results -- References -- Privacy-Preserving Observation in Public Spaces -- 1 Introduction -- 2 Related Work -- 2.1 Privacy-Preserving Billing -- 2.2 Threat Model -- 3 Collusion Attack -- 3.1 Model -- 3.2 Collusion Strategy -- 3.3 Analysis -- 4 Privacy-Preserving Spot Checking -- 4.1 Setup and Registration -- 4.2 Security Properties -- 4.3 Protocol -- 4.4 Optimization -- 4.5 Efficiency Analysis -- 4.6 Rate Limiting -- 4.7 Disposal -- 5 Example Application -- 6 Conclusions -- A Privacy vs. Penalty Analysis -- A.1 Variables -- A.2 Analysis -- References -- Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions -- 1 Introduction -- 1.1 State-of-the-Art -- 1.2 Our Contribution -- 1.3 Organization -- 2 Analysis of JPH Protocols -- 2.1 Preliminary of JPH Protocols -- 2.2 JPH Online Protocol -- 2.3 JPH Offline Protocol -- 3 New Formulation of Recommender System -- 3.1 Computing Predicted Ratings -- 3.2 Threat Model -- 4 New Privacy-Preserving Recommender Protocols -- 4.1 Recommendation Protocol for Single Prediction -- 4.2 Recommendation Protocol for Top-N Items -- 5 Evaluating the Proposed Protocols -- 6 Conclusion -- References -- Cloud Security -- Rich Queries on Encrypted Data: Beyond Exact Matches -- 1 Introduction -- 2 Preliminaries -- 3 Range Queries -- 4 Substring Queries -- 4.1 Basic SSE Substring Search -- 4.2 Wildcards and Phrase Queries.
4.3 Substring Protocol Extensions -- 5 Security Analysis -- A Implementation and Performance -- References -- Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data -- 1 Introduction -- 2 Related Work -- 3 Proposed Revocable Cloud Data Encryption Model -- 3.1 System Overview -- 3.2 Notations -- 3.3 Extended Proxy-Assisted User Revocation Approach -- 3.4 Formulation of Revocable Cloud Data Encryption -- 4 Our Construction -- 4.1 Construction Details -- 4.2 Functional Analysis -- Features -- 4.3 Security Analysis -- 5 Implementation of Our Construction -- 5.1 Proof-of-Concept -- 5.2 Performance Results -- 6 Conclusion -- References -- Batch Verifiable Computation of Polynomials on Outsourced Data -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Overview of the Constructions -- 1.3 Related Work -- 1.4 Organization -- 2 Preliminaries -- 2.1 Batch Verifiable Computation on Outsourced Data -- 2.2 A Lemma -- 3 Constructions -- 3.1 The First Construction -- 3.2 The Second Construction -- 4 Analysis -- 5 Concluding Remarks -- A Proof of Lemma 1 -- References -- CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud -- 1 Introduction -- 2 Problem Formulation: Outsourcing Computation of Biometric Identification -- 2.1 System Model and Assumptions -- 2.2 Threat Model -- 3 Privacy-Preserving Biometric Identification: An Examination of the State-of-the-Art -- 3.1 The Biometric Identification Scheme of Huang et al. -- 3.2 The Biometric Identification Scheme of Yuan et al. -- 4 Our Construction: The New and Improved Solutions -- 4.1 CloudBI-I: The Basic Scheme -- 4.2 CloudBI-II: The Enhanced Scheme -- 5 Implementation and Evaluation -- 5.1 Complexity Analysis -- 5.2 Experimental Evaluation -- 6 Concluding Remarks -- A Attack on Yuan et al. by Eliminating Randomness.
B Attack on Yuan et al. by Exploiting Euclidian Distance Results -- References -- Protocols and Attribute-based Encryption -- Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment -- 1 Introduction -- 2 Messages, Formats and the Intruder Model -- 2.1 Messages -- 2.2 Formats -- 2.3 Intruder Knowledge and Deduction Rules -- 3 Protocol Semantics -- 3.1 Symbolic Constraints -- 3.2 Operational Strands -- 3.3 Goal Predicates in the Geometric Fragment -- 4 Constraint Solving -- 4.1 From Geometric Fragment to Symbolic Constraints -- 4.2 Constraint Reduction -- 5 Typed Model -- 5.1 Message Patterns -- 6 Parallel Composition -- 7 Tool Support -- 8 Conclusions and Related Work -- A Appendix: Proofs of the Technical Results -- References -- Checking Trace Equivalence: How to Get Rid of Nonces? -- 1 Introduction -- 2 Model for Security Protocols -- 2.1 Term Algebra -- 2.2 Process Algebra -- 2.3 Semantics -- 2.4 Trace Equivalence -- 3 Main Contribution: Getting Rid of Nonces -- 3.1 Our Hypotheses -- 3.2 Our Transformation -- 3.3 Main Result -- 3.4 Sketch of Proof -- 4 Scope of Our Result -- 4.1 Simple Processes -- 4.2 Adequate Theories -- 5 Application of Our Result -- 5.1 Is Our Abstraction Precise Enough? -- 5.2 Proof Technique -- 6 Conclusion -- A Appendix -- References -- Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key -- 1 Introduction -- 2 Preliminaries -- 2.1 Bilinear Map on Prime Order Groups -- 2.2 The Viète's formulas -- 2.3 Access Structure -- 2.4 KP-ABBE Definition -- 2.5 CP-ABBE Definition -- 3 KP-ABBE Scheme -- 4 CP-ABBE Scheme -- 5 Security Analysis -- 6 Conclusion -- References -- Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Our Technique.
1.3 Related Work -- 1.4 Organization -- 2 Background -- 2.1 Notation -- 2.2 Access Policy -- 2.3 Linear Secret-Sharing Schemes -- 2.4 Composite Order Bilinear Groups -- 2.5 Complexity Assumptions -- 2.6 Zero-Knowledge Proof of Knowledge of Discrete Log -- 3 Accountable Authority CP-ABE with White-Box Traceability and Public Auditing -- 3.1 Definition -- 3.2 Security -- 4 Our System -- 4.1 Construction -- 4.2 IND-CPA Security -- 4.3 DishonestAuthority Security -- 4.4 DishonestUser Security -- 4.5 Key Sanity Check Proof -- 5 Conclusion and Future Work -- A Proof of Lemma 2 -- B Proof of Theorem 2 -- C Proof Sketch of Theorem 3 -- D Proof of Theorem 4 -- References -- Code Analysis and Side-Channels -- DexHunter: Toward Extracting Hidden Code from Packed Android Applications -- 1 Introduction -- 2 Analysis of Packing Services -- 2.1 Common Techniques Used by Packing Services -- 2.2 Packers Under Investigation -- 3 DexHunter: Goal and Basic Idea -- 3.1 Basic Idea -- 3.2 ART -- 3.3 DVM -- 4 DexHunter: Design and Implementation -- 4.1 Architecture -- 4.2 Locating and Dumping Dex Files -- 4.3 Proactive Class Loading and Initialization -- 4.4 Identifying Packers -- 4.5 Extracting the Values of location_ and fileName -- 5 Evaluation -- 5.1 Overhead Introduced by Packers -- 5.2 DexHunter's Effectiveness -- 5.3 DexHunter's Efficiency -- 6 Discussion -- 7 Related Work -- 8 Conclusion -- References -- Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software -- 1 Introduction -- 2 Problem Overview -- 2.1 Motivating Example -- 2.2 Problem Definition -- 2.3 Memory Access Patterns to Detect DUIs -- 3 Design -- 3.1 Overview -- 3.2 Suspicious Instruction Shortlisting -- 3.3 Dereference Behavior Analysis -- 4 Implementation -- 4.1 Taint Propagation -- 4.2 Access Formula Generation -- 5 Evaluation -- 5.1 Efficacy -- 5.2 Performance.
5.3 Security Implications.
Record Nr. UNISA-996466470703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security -- ESORICS 2015 [[electronic resource] ] : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I / / edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
Computer Security -- ESORICS 2015 [[electronic resource] ] : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I / / edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 543 p. 114 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-24174-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Organization -- Contents - Part I -- Contents - Part II -- Networks and Web Security -- Towards Security of Internet Naming Infrastructure -- 1 Introduction -- 2 Related Work -- 2.1 Understanding the DNS Infrastructure -- 2.2 Misconfigured Networks -- 2.3 DNS Security -- 3 Studying DNS Name Servers -- 3.1 Recursive Authoritative Name Servers -- 3.2 Why Use Server-Side Caches? -- 3.3 Who Operates and Uses RANS? -- 3.4 Methodology for Detecting RANSes -- 4 Evaluating (in)Security of RANSes -- 4.1 Services Coresidence -- 4.2 Source Port Randomisation -- 4.3 DNSSEC -- 4.4 Implications of Vulnerable RANSes -- 5 Conclusions -- A Overview: DNS and DNSSEC -- References -- Waiting for CSP -- Securing Legacy Web Applications with JSAgents -- 1 Introduction -- 2 Related Work -- 3 JSAgents Architecture -- 3.1 Building Blocks -- 3.2 JSAgents Core Library -- 3.3 JSAgents Modules -- 3.4 JSAgents Policy Files -- 4 Security Evaluation -- 5 Performance Evaluation -- 6 Future Work -- A Comparable Approaches -- A.1 From XSS Filters to CSP 1.0 -- A.2 Content Security Policy -- References -- Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web -- 1 Introduction -- 2 The Web Model -- 2.1 Communication Model -- 2.2 Web System -- 2.3 Web Browsers -- 3 General Security Properties -- 4 The BrowserID System -- 4.1 Overview -- 4.2 Implementation Details -- 5 Analysis of BrowserID: Authentication Properties -- 5.1 Modeling of BrowserID with Primary IdPs -- 5.2 Authentication Properties of the BrowserID System -- 5.3 Identity Injection Attack on BrowserID with Primary IdPs -- 5.4 Security of the Fixed System -- 6 Privacy of BrowserID -- 6.1 Privacy Attacks on BrowserID -- 6.2 Fixing the Privacy of BrowserID -- 7 Related Work -- 8 Conclusion -- A Browser Model -- A.1 Browser State: Zp and sp0.
A.2 Web Browser Relation Rp -- B Additional Privacy Attack Variants -- References -- System Security -- A Practical Approach for Adaptive Data Structure Layout Randomization -- 1 Introduction -- 2 Overview -- 2.1 Threat Model -- 2.2 System Overview -- 3 Design and Implementation of SALADS -- 3.1 Extraction Component -- 3.2 Randomization Component -- 3.3 De-randomization Component -- 3.4 Other Practical Issues -- 4 Evaluation -- 4.1 Effectiveness of DSSR Application Programs -- 4.2 Effectiveness of DSSR Kernel and DSSR Hypervisor -- 4.3 Performance Overhead -- 4.4 Memory Overhead -- 5 Discussion -- 5.1 Analysis of Effectiveness -- 5.2 Limitations -- 6 Related Work -- 7 Conclusion -- A Details of Lmbench Results -- References -- Trustworthy Prevention of Code Injection in Linux on Embedded Devices -- 1 Introduction -- 2 Background -- 2.1 The Prosper Hypervisor -- 2.2 The Attack Model -- 2.3 Formal Model of the Hypervisor -- 3 Design -- 4 Formal Model of MProsper -- 5 Verification Strategy -- 6 Evaluation -- 7 Related Work -- 8 Concluding Remarks -- References -- Practical Memory Deduplication Attacks in Sandboxed Javascript -- 1 Introduction -- 2 Background -- 2.1 Shared Memory -- 2.2 Page-Deduplication Attacks -- 3 Description of Our Javascript-Based Attack -- 4 Practical Attacks and Evaluation -- 4.1 Cross-VM Attack on Private Clouds -- 4.2 Attack on Personal Computers and Smartphones -- 5 Countermeasures -- 6 Conclusion -- References -- Cryptography -- Computational Soundness for Interactive Primitives -- 1 Introduction -- 2 Related Work -- 3 Review of the CoSP Framework for Equivalence -- 4 Review of the UC Framework -- 5 Ideal Functionalities in the Symbolic Model -- 6 Ideal Functionalities in the Computational Model -- 7 Real Protocols in CoSP -- 8 Computational Soundness for Interactive Primitives -- 9 Case Study: Untraceable Payments.
A Protocol Conditions -- References -- Verifiably Encrypted Signatures: Security Revisited and a New Construction -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 1.3 Outline -- 2 Preliminaries -- 2.1 Digital Signatures -- 2.2 Structure-Preserving Signatures on Equivalence Classes -- 2.3 Verifiably Encrypted Signatures -- 3 The Importance of Resolution Independence -- 3.1 Counterexample -- 3.2 Filling the Gap -- 4 Verifiably Encrypted Signatures from SPS-EQ-R -- 5 Public-Key Encryption from SPS-EQ-R -- 6 Conclusion -- References -- A Omitted Proofs -- Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions -- 1 Introduction -- 2 Cryptanalytic Time-Memory Trade-Offs -- 2.1 Hellman Scheme -- 2.2 Oechslin Scheme -- 2.3 Related Works -- 3 Interleaving -- 3.1 Description -- 3.2 Analysis -- 4 Order of Visit -- 4.1 Discussion -- 4.2 Analysis -- 5 Input Set Partition and Memory Allocation -- 5.1 Input Set Partition -- 5.2 Memory Allocation -- 6 Results -- 6.1 Statistics -- 6.2 RockYou -- 6.3 10 Million Combos -- 6.4 Discussion -- 7 Conclusion -- A Proof of Theorem -- B Subsets of 10 Million Combos -- References -- Efficient Message Authentication Codes with Combinatorial Group Testing -- 1 Introduction -- 2 Preliminaries -- 3 MAC for Corruption Identification -- 3.1 Combinatorial Group Testing -- 3.2 MAC for Extended Vector Space -- 3.3 Efficient Group Testing MAC -- 3.4 Security Notions -- 3.5 Remarks -- 3.6 Provable Security of GTM -- 4 Experimental Implementation -- 5 Concluding Remarks -- References -- Symmetric-Key Based Proofs of Retrievability Supporting Public Verification -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 2.1 Proofs of Retrievability -- 2.2 Obfuscation Preliminaries -- 2.3 Puncturable PRFs -- 3 Security Definitions -- 3.1 Security Definitions on Static PoR.
3.2 Security Definitions on Dynamic PoR -- 4 Constructions -- 4.1 Static Publicly Verifiable PoR Scheme -- 4.2 PoR Scheme Supporting Efficient Dynamic Updates -- 4.3 Security Proofs -- 5 Analysis and Comparisons -- 6 Conclusions -- A Discussions and Future Directions Towards i O -- A.1 Outsourced and Joint Generation of Indistinguishability Obfuscation -- A.2 Reusability and Universality of Indistinguishability Obfuscation -- A.3 Obfuscation for Specific Functions -- References -- DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead -- 1 Introduction -- 2 Preliminaries -- 2.1 Security Standards in the Internet (of Things) -- 2.2 DTLS-PSK -- 2.3 Attack Model and Security Goals -- 3 HIMMO and HIMMO Extensions -- 3.1 HIMMO Operation -- 3.2 Implicit Certification and Verification of Credentials -- 3.3 Enhancing Privacy by Using Multiple TTPs -- 4 Implementation and Performance -- 5 (D)TLS-HIMMO -- 5.1 DTLS-HIMMO Configurations -- 5.2 (D)TLS-HIMMO Handshake -- 5.3 Privacy Protection -- 5.4 TTP Infrastructure -- 5.5 Security Considerations of (D)TLS-HIMMO -- 6 Performance of DTLS-HIMMO and Comparison with Existing (D)TLS Alternatives -- 7 Conclusions -- References -- Short Accountable Ring Signatures Based on DDH -- 1 Introduction -- 2 Defining Accountable Ring Signatures -- 2.1 Ring and Group Signatures from Accountable Ring Signatures -- 3 Preliminaries -- 4 Constructing Accountable Ring Signatures -- 5 Efficient Instantiation -- A Proof of Theorem 1 -- B Security Proofs of Our -Protocols -- B.1 Proof of Lemma 1 -- B.2 Proof of Lemma 2 -- B.3 Proof of Lemma 3 -- B.4 Proof of Lemma 5 -- References -- Updatable Hash Proof System and Its Applications -- 1 Introduction -- 1.1 Our Results -- 1.2 Related Work -- 2 Preliminaries -- 3 Updatable Hash Proof System -- 4 Building CML-PKE from UHPS -- 4.1 A CPA-Secure Scheme.
4.2 CCA-Secure Schemes -- 4.3 PKE Schemes with Leakage During Key Update -- 5 Instantiations of Updatable Hash Proof System -- 5.1 Instantiation from the SXDH Assumption -- 5.2 Parameters -- A Omitted Constructions in Sect.4.2 -- References -- Server-Aided Revocable Identity-Based Encryption -- 1 Introduction -- 2 Preliminaries -- 3 Definition and Security of SR-IBE -- 4 Construction of SR-IBE Scheme -- 4.1 The Node Selection Algorithm: KUNodes -- 4.2 The Construction -- 5 Security Proof -- 6 Conclusion -- A Proof of Theorem 2 -- References -- Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 1.3 Roadmap -- 2 Preliminaries -- 2.1 Commitment Schemes -- 2.2 Zero-Knowledge Proofs and -Protocols -- 2.3 Learning with Errors -- 2.4 Rejection Sampling -- 3 Commitments from Ring-LWE -- 4 Zero-Knowledge of Proofs of Knowledge -- 4.1 Preimage Proofs -- 4.2 Proving Linear Relations -- 4.3 Proving Multiplicative Relations -- 5 Conclusion -- A Proofs -- A.1 Proofs of Theorem 4.5 -- A.2 Proofs of Theorem 4.6 -- References -- Making Any Identity-Based Encryption Accountable, Efficiently -- 1 Introduction -- 2 Generic Construction of A-IBE with Constant Size Ciphertext -- 2.1 Detailed Construction -- 2.2 Security Analysis -- 3 Generic Construction of A-IBE Allowing Public Traceability and Identity Reuse -- 3.1 A General Framework Allowing Identity Re-use -- 3.2 Building Blocks for Public Traceability -- 3.3 Concrete Construction and Security Analysis -- 4 Conclusions and Open Problems -- A Preliminaries -- References -- Practical Threshold Password-Authenticated Secret Sharing Protocol -- 1 Introduction -- 2 Definition of Security -- 3 Our TPASS Protocol -- 3.1 Description of Our Protocol -- 3.2 Correctness and Efficiency -- 4 Security Analysis -- 5 Conclusion.
References.
Record Nr. UNISA-996466469903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui