Applied cryptography and network security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings / Feng Bao, Pierangela Samarati, Jianying Zhou (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 7341. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resourceContent type: - text
- computer
- online resource
- 9783642312847
- 3642312845
- 3642312837
- 9783642312830
- ACNS 2012
- Data encryption (Computer science) -- Congresses
- Computer networks -- Security measures -- Congresses
- Chiffrement (Informatique) -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Informatique
- Computer networks -- Security measures
- Data encryption (Computer science)
- Computer science
- Computer Communication Networks
- Data structures (Computer science)
- Data encryption (Computer science)
- Coding theory
- Information Systems
- Systems and Data Security
- Management of Computing and Information Systems
- computerwetenschappen
- computer sciences
- informatiesystemen
- informatietheorie
- information theory
- gegevensbeheer
- data management
- gegevensstructuren
- data structures
- computernetwerken
- computer networks
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8/2 23
- QA76.9.A25 A26 2012
- 54.62
- 54.32
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
880-01 Security Analysis of a Multi-factor Authenticated Key Exchange Protocol / Feng Hao and Dylan Clarke -- Breaking an Animated CAPTCHA Scheme / Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo -- Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens / Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel and Cem Paya, et al. -- RIKE: Using Revocable Identities to Support Key Escrow in PKIs / Nan Zhang, Jingqiang Lin, Jiwu Jing and Neng Gao -- TreVisor / OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks / Tilo Müller, Benjamin Taubmann and Felix C. Freiling -- Authenticated Encryption: How Reordering Can Impact Performance / Basel Alomair -- Length-Doubling Ciphers and Tweakable Ciphers / Haibin Zhang -- Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers / Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng and Chuankun Wu -- Security Enhancements by OR-Proof in Identity-Based Identification / Atsushi Fujioka, Taiichi Saito and Keita Xagawa -- Identity-Based Extractable Hash Proofs and Their Applications / Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao -- On Structural Signatures for Tree Data Structures / Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer -- Inner-Product Lossy Trapdoor Functions and Applications / Xiang Xie, Rui Xue and Rui Zhang -- On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification / Afonso Arriaga, Manuel Barbosa and Pooya Farshim -- Secure Accumulators from Euclidean Rings without Trusted Setup / Helger Lipmaa -- Linear Fault Analysis of Block Ciphers / Zhiqiang Liu, Dawu Gu, Ya Liu and Wei Li -- Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys / Yuki Asano, Shingo Yanagihara and Tetsu Iwata -- Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions / Yu Sasaki and Lei Wang.
Includes bibliographical references and author index.
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.