Skip to:Content
|
Bottom
Cover image for Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
Title:
Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
Author:
Lin, Dongdai. editor.
ISBN:
9783319167459
Edition:
1st ed. 2015.
Physical Description:
XIII, 547 p. 92 illus. online resource.
Series:
Security and Cryptology, 8957
Contents:
An Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion Tolerance -- Ring Signatures of Constant Size Without Random Oracles -- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control -- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge -- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices with Applications -- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails -- The Boomerang Attacks on BLAKE and BLAKE2 -- Second Preimage Analysis of Whirlwind -- Boomerang Attack on Step-Reduced SHA-512 -- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption -- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts -- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks -- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication -- A Note on Diem's Proof -- Stand-by Attacks on E-ID Password Authentication -- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps -- A Lightweight Security Isolation Approach for Virtual Machines Deployment -- A Novel Approach to True Random NumberGeneration in Wearable Computing Environments Using MEMS Sensors.
Added Corporate Author:
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 518785-1001 XX(518785.1)
Searching...

On Order

Go to:Top of Page