Description |
1 online resource (xiii, 388 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 7863 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7863.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Network Security. Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection / Yuxin Meng, Lam-For Kwok -- Trusted Identity Management for Overlay Networks / Stefan Kraxberger [and others] -- Situational Awareness for Improving Network Resilience Management / Mixia Liu [and others] -- Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model / Yuling Liu [and others] -- Attribute Specified Identity-Based Encryption / Hao Xiong [and others] -- Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions / Mingwu Zhang [and others] -- Identity-Based Multisignature with Message Recovery / Kefeng Wang, Yi Mu, Willy Susilo -- Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme / Dingding Jia [and others] |
|
Cryptographic Primitives. Accountable Trapdoor Sanitizable Signatures / Junzuo Lai, Xuhua Ding, Yongdong Wu -- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release / Kaitai Liang [and others] -- About Hash into Montgomery Form Elliptic Curves / Wei Yu [and others] -- Joint Triple-Base Number System for Multi-Scalar Multiplication / Wei Yu [and others] |
|
Security Protocols. Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks / Divyan Munirathnam Konidala [and others] -- Secure RFID Ownership Transfer Protocols / Nan Li [and others] -- Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model / Guomin Yang [and others] -- Simplified PACE-AA Protocol / Lucjan Hanzlik, Łukasz Krzywiecki, Mirosław Kutyłowski |
|
System Security. Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control / Xiaofan Liu, Natasha Alechina, Brian Logan -- Efficient Attack Detection Based on a Compressed Model / Shichao Jin, Okhee Kim, Tieming Chen -- A Digital Forensic Framework for Automated User Activity Reconstruction / Jungin Kang, Sangwook Lee, Heejo Lee -- Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware / Jairo Serrano [and others] |
|
Software Security DRM. VulLocator: Automatically Locating Vulnerable Code in Binary Programs / Yingjun Zhang, Kai Chen, Yifeng Lian -- Software Protection with Obfuscation and Encryption / Vivek Balachandran, Sabu Emmanuel -- Secure Content Delivery in DRM System with Consumer Privacy / Dheerendra Mishra, Sourav Mukhopadhyay |
|
Cryptanalysis and Side Channel Attacks. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers / Hui Zhao [and others] -- Cryptanalysis of the OKH Authenticated Encryption Scheme / Peng Wang, Wenling Wu, Liting Zhang -- Security Evaluation of Rakaposhi Stream Cipher / Mohammad Ali Orumiehchiha [and others] -- Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher / Ling Song, Lei Hu |
Summary |
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks |
Analysis |
Computer science |
|
Data protection |
|
Data encryption (Computer science) |
|
Information Systems |
|
Systems and Data Security |
|
Management of Computing and Information Systems |
|
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
gegevensbeheer |
|
data management |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Notes |
International conference proceedings |
|
Includes author index |
|
Print version record |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer security.
|
|
Computer networks.
|
|
Computer Security
|
|
Computer Communication Networks
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Deng, Robert H., editor
|
|
Feng, Tao, editor
|
ISBN |
9783642380334 |
|
3642380336 |
|