Limit search to available items
Book Cover
E-book
Author ISPEC (Conference) (9th : 2013 : Lanzhou Shi, China)

Title Information security practice and experience : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings / Robert H. Deng, Tao Feng (eds.)
Published Berlin ; New York : Springer, ©2013
Berlin ; New York : Springer, [2013]
©2013

Copies

Description 1 online resource (xiii, 388 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 7863
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7863.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Network Security. Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection / Yuxin Meng, Lam-For Kwok -- Trusted Identity Management for Overlay Networks / Stefan Kraxberger [and others] -- Situational Awareness for Improving Network Resilience Management / Mixia Liu [and others] -- Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model / Yuling Liu [and others] -- Attribute Specified Identity-Based Encryption / Hao Xiong [and others] -- Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions / Mingwu Zhang [and others] -- Identity-Based Multisignature with Message Recovery / Kefeng Wang, Yi Mu, Willy Susilo -- Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme / Dingding Jia [and others]
Cryptographic Primitives. Accountable Trapdoor Sanitizable Signatures / Junzuo Lai, Xuhua Ding, Yongdong Wu -- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release / Kaitai Liang [and others] -- About Hash into Montgomery Form Elliptic Curves / Wei Yu [and others] -- Joint Triple-Base Number System for Multi-Scalar Multiplication / Wei Yu [and others]
Security Protocols. Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks / Divyan Munirathnam Konidala [and others] -- Secure RFID Ownership Transfer Protocols / Nan Li [and others] -- Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model / Guomin Yang [and others] -- Simplified PACE-AA Protocol / Lucjan Hanzlik, Łukasz Krzywiecki, Mirosław Kutyłowski
System Security. Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control / Xiaofan Liu, Natasha Alechina, Brian Logan -- Efficient Attack Detection Based on a Compressed Model / Shichao Jin, Okhee Kim, Tieming Chen -- A Digital Forensic Framework for Automated User Activity Reconstruction / Jungin Kang, Sangwook Lee, Heejo Lee -- Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware / Jairo Serrano [and others]
Software Security DRM. VulLocator: Automatically Locating Vulnerable Code in Binary Programs / Yingjun Zhang, Kai Chen, Yifeng Lian -- Software Protection with Obfuscation and Encryption / Vivek Balachandran, Sabu Emmanuel -- Secure Content Delivery in DRM System with Consumer Privacy / Dheerendra Mishra, Sourav Mukhopadhyay
Cryptanalysis and Side Channel Attacks. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers / Hui Zhao [and others] -- Cryptanalysis of the OKH Authenticated Encryption Scheme / Peng Wang, Wenling Wu, Liting Zhang -- Security Evaluation of Rakaposhi Stream Cipher / Mohammad Ali Orumiehchiha [and others] -- Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher / Ling Song, Lei Hu
Summary This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks
Analysis Computer science
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
computerwetenschappen
computer sciences
informatiesystemen
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Includes author index
Print version record
Subject Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Computer security.
Computer networks.
Computer Security
Computer Communication Networks
Computer networks
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Deng, Robert H., editor
Feng, Tao, editor
ISBN 9783642380334
3642380336
Other Titles ISPEC 2013