Foundations and practice of security : 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers / Joaquin Garcia-Alfaro, Pascal Lafourcade (eds.).
Material type:
TextPublisher number: Best.-Nr.: 86040357Series: Lecture notes in computer science ; 6888. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Heidelberg ; New York : Springer, ©2012.Description: 1 online resource (xiii, 251 pages) : illustrations (some color)Content type: - text
- computer
- online resource
- 9783642279010
- 3642279015
- FPS 2011
- 005.82 23
- QA76.9.A25 F695 2011eb
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Keynote Address. Preserving Privacy in Online Social Networks / Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi -- Short Papers. TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections / Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs -- Automated Verification of Block Cipher Modes of Operation, an Improved Method / Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini -- Pervasive Security and Threshold Cryptography. SC 2: Secure Communication over Smart Cards / Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra -- Private Identification of RFID Tags / Behzad Malek, Ali Miri -- Threshold Encryption into Multiple Ciphertexts / Martin Stanek -- Encryption, Cryptanalysis and Automatic Verification. A Novel Commutative Blinding Identity Based Encryption Scheme / Yu Chen, Song Luo, Jianbin Hu, Zhong Chen.
A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules / Marina Pudovkina -- A Computational Indistinguishability Logic for the Bounded Storage Model / Gilles Barthe, Mathilde Duclos, Yassine Lakhnech -- Keynote Addresses. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol / Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis -- Secret Key Establishment over Noisy Channels / Hadi Ahmadi, Reihaneh Safavi-Naini -- Formal Methods and Network Security. Formal Specification and Validation of Security Policies / Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner -- Vote-Independence: A Powerful Privacy Notion for Voting Protocols / Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech -- Black-Box Property of Cryptographic Hash Functions / Michal Rjaško -- Phishing Detection with Popular Search Engines: Simple and Effective / Jun Ho Huh, Hyoungshick Kim.
Ongoing Research. A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress / Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis -- A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress / Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis -- Specification and Verification of Access Control Policies in EB3SEC: Work in Progress / Pierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau -- A Metamodel of the B Modeling of Access-Control Policies: Work in Progress / Jérémy Milhau, Marc Frappier, Régine Laleau -- Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress / Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro.
Online resource; title from PDF title page (SpringerLink; viewed Mar. 13, 2012).
Annotation This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methodsin network security.
Includes bibliographical references and index.