Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers - Lecture Notes in Computer Science - Dongdai Lin - Livros - Springer International Publishing AG - 9783319167442 - 8 de abril de 2015
Caso a capa e o título não sejam correspondentes, considere o título como correto

Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers - Lecture Notes in Computer Science 2015 edition

Dongdai Lin

Preço
€ 64,99

Item sob encomenda (no estoque do fornecedor)

Data prevista de entrega 2 - 11 de dez
Presentes de Natal podem ser trocados até 31 de janeiro
Adicione à sua lista de desejos do iMusic

Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers - Lecture Notes in Computer Science 2015 edition

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014.


Marc Notes: Post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. Table of Contents: An Efficient Privacy-Preserving E-coupon System.- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications.- Security of Direct Anonymous Authentication Using TPM 2.0 Signature.- Revocation in Publicly Verifiable Outsourced Computation.- Private Aggregation with Custom Collusion Tolerance.- Ring Signatures of Constant Size Without Random Oracles.- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC.- Optimal Proximity Proofs.- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions.- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.- Fully Homomorphic Encryption with Auxiliary Inputs.- Trapdoors for Ideal Lattices with Applications.- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.- The Boomerang Attacks on BLAKE and BLAKE2.- Second Preimage Analysis of Whirlwind.- Boomerang Attack on Step-Reduced SHA-512.- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique.- Rig: A Simple, Secure and Flexible Design for Password Hashing.- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption.- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks.- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication.- A Note on Diem s Proof.- Stand-by Attacks on E-ID Password Authentication.- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.- A Lightweight Security Isolation Approach for Virtual Machines Deployment.- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors."

Mídia Livros     Paperback Book   (Livro de capa flexível e brochura)
Lançado 8 de abril de 2015
ISBN13 9783319167442
Editoras Springer International Publishing AG
Genre Aspects (Academic) > Science / Technology Aspects
Páginas 547
Dimensões 155 × 235 × 29 mm   ·   8,42 kg
Idioma French  
Editor Lin, Dongdai
Editor Yung, Moti
Editor Zhou, Jianying

Mostrar tudo

Mais por Dongdai Lin

Ver tudo de Dongdai Lin ( por exemplo Paperback Book )