Amazon cover image
Image from Amazon.com

Applied cryptography and network security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings / Feng Bao, Pierangela Samarati, Jianying Zhou (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 7341. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642312847
  • 3642312845
  • 3642312837
  • 9783642312830
Other title:
  • ACNS 2012
Subject(s): Genre/Form: Additional physical formats: Applied cryptography and network securityDDC classification:
  • 005.8/2 23
LOC classification:
  • QA76.9.A25 A26 2012
Other classification:
  • 54.62
  • 54.32
Online resources:
Contents:
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol / Feng Hao and Dylan Clarke -- Breaking an Animated CAPTCHA Scheme / Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo -- Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens / Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel and Cem Paya, et al. -- RIKE: Using Revocable Identities to Support Key Escrow in PKIs / Nan Zhang, Jingqiang Lin, Jiwu Jing and Neng Gao -- TreVisor / OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks / Tilo Müller, Benjamin Taubmann and Felix C. Freiling -- Authenticated Encryption: How Reordering Can Impact Performance / Basel Alomair -- Length-Doubling Ciphers and Tweakable Ciphers / Haibin Zhang -- Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers / Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng and Chuankun Wu -- Security Enhancements by OR-Proof in Identity-Based Identification / Atsushi Fujioka, Taiichi Saito and Keita Xagawa -- Identity-Based Extractable Hash Proofs and Their Applications / Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao -- On Structural Signatures for Tree Data Structures / Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer -- Inner-Product Lossy Trapdoor Functions and Applications / Xiang Xie, Rui Xue and Rui Zhang -- On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification / Afonso Arriaga, Manuel Barbosa and Pooya Farshim -- Secure Accumulators from Euclidean Rings without Trusted Setup / Helger Lipmaa -- Linear Fault Analysis of Block Ciphers / Zhiqiang Liu, Dawu Gu, Ya Liu and Wei Li -- Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys / Yuki Asano, Shingo Yanagihara and Tetsu Iwata -- Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions / Yu Sasaki and Lei Wang.
Summary: This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

880-01 Security Analysis of a Multi-factor Authenticated Key Exchange Protocol / Feng Hao and Dylan Clarke -- Breaking an Animated CAPTCHA Scheme / Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo -- Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens / Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel and Cem Paya, et al. -- RIKE: Using Revocable Identities to Support Key Escrow in PKIs / Nan Zhang, Jingqiang Lin, Jiwu Jing and Neng Gao -- TreVisor / OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks / Tilo Müller, Benjamin Taubmann and Felix C. Freiling -- Authenticated Encryption: How Reordering Can Impact Performance / Basel Alomair -- Length-Doubling Ciphers and Tweakable Ciphers / Haibin Zhang -- Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers / Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng and Chuankun Wu -- Security Enhancements by OR-Proof in Identity-Based Identification / Atsushi Fujioka, Taiichi Saito and Keita Xagawa -- Identity-Based Extractable Hash Proofs and Their Applications / Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao -- On Structural Signatures for Tree Data Structures / Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer -- Inner-Product Lossy Trapdoor Functions and Applications / Xiang Xie, Rui Xue and Rui Zhang -- On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification / Afonso Arriaga, Manuel Barbosa and Pooya Farshim -- Secure Accumulators from Euclidean Rings without Trusted Setup / Helger Lipmaa -- Linear Fault Analysis of Block Ciphers / Zhiqiang Liu, Dawu Gu, Ya Liu and Wei Li -- Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys / Yuki Asano, Shingo Yanagihara and Tetsu Iwata -- Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions / Yu Sasaki and Lei Wang.

Includes bibliographical references and author index.

This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.

Powered by Koha