Amazon cover image
Image from Amazon.com

Foundations and practice of security : 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers / Joaquin Garcia-Alfaro, Pascal Lafourcade (eds.).

By: Contributor(s): Material type: TextTextPublisher number: Best.-Nr.: 86040357Series: Lecture notes in computer science ; 6888. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Heidelberg ; New York : Springer, ©2012.Description: 1 online resource (xiii, 251 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642279010
  • 3642279015
Other title:
  • FPS 2011
Subject(s): Genre/Form: Additional physical formats: Print version:: Foundations and practice of security.DDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25 F695 2011eb
Online resources:
Contents:
Keynote Address. Preserving Privacy in Online Social Networks / Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi -- Short Papers. TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections / Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs -- Automated Verification of Block Cipher Modes of Operation, an Improved Method / Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini -- Pervasive Security and Threshold Cryptography. SC 2: Secure Communication over Smart Cards / Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra -- Private Identification of RFID Tags / Behzad Malek, Ali Miri -- Threshold Encryption into Multiple Ciphertexts / Martin Stanek -- Encryption, Cryptanalysis and Automatic Verification. A Novel Commutative Blinding Identity Based Encryption Scheme / Yu Chen, Song Luo, Jianbin Hu, Zhong Chen.
A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules / Marina Pudovkina -- A Computational Indistinguishability Logic for the Bounded Storage Model / Gilles Barthe, Mathilde Duclos, Yassine Lakhnech -- Keynote Addresses. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol / Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis -- Secret Key Establishment over Noisy Channels / Hadi Ahmadi, Reihaneh Safavi-Naini -- Formal Methods and Network Security. Formal Specification and Validation of Security Policies / Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner -- Vote-Independence: A Powerful Privacy Notion for Voting Protocols / Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech -- Black-Box Property of Cryptographic Hash Functions / Michal Rjaško -- Phishing Detection with Popular Search Engines: Simple and Effective / Jun Ho Huh, Hyoungshick Kim.
Ongoing Research. A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress / Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis -- A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress / Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis -- Specification and Verification of Access Control Policies in EB3SEC: Work in Progress / Pierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau -- A Metamodel of the B Modeling of Access-Control Policies: Work in Progress / Jérémy Milhau, Marc Frappier, Régine Laleau -- Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress / Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro.
In: Springer eBooksSummary: Annotation This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methodsin network security.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Keynote Address. Preserving Privacy in Online Social Networks / Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi -- Short Papers. TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections / Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs -- Automated Verification of Block Cipher Modes of Operation, an Improved Method / Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini -- Pervasive Security and Threshold Cryptography. SC 2: Secure Communication over Smart Cards / Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra -- Private Identification of RFID Tags / Behzad Malek, Ali Miri -- Threshold Encryption into Multiple Ciphertexts / Martin Stanek -- Encryption, Cryptanalysis and Automatic Verification. A Novel Commutative Blinding Identity Based Encryption Scheme / Yu Chen, Song Luo, Jianbin Hu, Zhong Chen.

A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules / Marina Pudovkina -- A Computational Indistinguishability Logic for the Bounded Storage Model / Gilles Barthe, Mathilde Duclos, Yassine Lakhnech -- Keynote Addresses. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol / Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis -- Secret Key Establishment over Noisy Channels / Hadi Ahmadi, Reihaneh Safavi-Naini -- Formal Methods and Network Security. Formal Specification and Validation of Security Policies / Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner -- Vote-Independence: A Powerful Privacy Notion for Voting Protocols / Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech -- Black-Box Property of Cryptographic Hash Functions / Michal Rjaško -- Phishing Detection with Popular Search Engines: Simple and Effective / Jun Ho Huh, Hyoungshick Kim.

Ongoing Research. A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress / Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis -- A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress / Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis -- Specification and Verification of Access Control Policies in EB3SEC: Work in Progress / Pierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau -- A Metamodel of the B Modeling of Access-Control Policies: Work in Progress / Jérémy Milhau, Marc Frappier, Régine Laleau -- Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress / Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro.

Online resource; title from PDF title page (SpringerLink; viewed Mar. 13, 2012).

Annotation This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methodsin network security.

Includes bibliographical references and index.

Powered by Koha