Applied cryptography and network security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings /

Applied cryptography and network security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings / ACNS 2012 Feng Bao, Pierangela Samarati, Jianying Zhou (eds.). - Berlin ; New York : Springer, ©2012. - 1 online resource - Lecture notes in computer science, 7341 0302-9743 ; LNCS sublibrary. SL 4, Security and cryptology . - Lecture notes in computer science ; 7341. LNCS sublibrary. SL 4, Security and cryptology. .

Includes bibliographical references and author index.

Security Analysis of a Multi-factor Authenticated Key Exchange Protocol / Breaking an Animated CAPTCHA Scheme / Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens / RIKE: Using Revocable Identities to Support Key Escrow in PKIs / TreVisor / Authenticated Encryption: How Reordering Can Impact Performance / Length-Doubling Ciphers and Tweakable Ciphers / Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers / Security Enhancements by OR-Proof in Identity-Based Identification / Identity-Based Extractable Hash Proofs and Their Applications / On Structural Signatures for Tree Data Structures / Inner-Product Lossy Trapdoor Functions and Applications / On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification / Secure Accumulators from Euclidean Rings without Trusted Setup / Linear Fault Analysis of Block Ciphers / Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys / Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions / Feng Hao and Dylan Clarke -- Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo -- Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel and Cem Paya, et al. -- Nan Zhang, Jingqiang Lin, Jiwu Jing and Neng Gao -- OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks / Tilo Müller, Benjamin Taubmann and Felix C. Freiling -- Basel Alomair -- Haibin Zhang -- Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng and Chuankun Wu -- Atsushi Fujioka, Taiichi Saito and Keita Xagawa -- Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao -- Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer -- Xiang Xie, Rui Xue and Rui Zhang -- Afonso Arriaga, Manuel Barbosa and Pooya Farshim -- Helger Lipmaa -- Zhiqiang Liu, Dawu Gu, Ya Liu and Wei Li -- Yuki Asano, Shingo Yanagihara and Tetsu Iwata -- Yu Sasaki and Lei Wang.

This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.

9783642312847 3642312845 3642312837 9783642312830

10.1007/978-3-642-31284-7 doi


Data encryption (Computer science)--Congresses.
Computer networks--Security measures--Congresses.
Chiffrement (Informatique)--Congrès.
Réseaux d'ordinateurs--Sécurité--Mesures--Congrès.
Informatique.
Computer networks--Security measures
Data encryption (Computer science)

Computer science. Computer Communication Networks. Data structures (Computer science) Data encryption (Computer science) Coding theory. Information Systems. Systems and Data Security. Management of Computing and Information Systems. computerwetenschappen computer sciences informatiesystemen informatietheorie information theory gegevensbeheer data management gegevensstructuren data structures computernetwerken computer networks Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen)


Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.

QA76.9.A25 / A26 2012

005.8/2

Powered by Koha