Atjaunināt sīkdatņu piekrišanu

E-grāmata: Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 9241
  • Izdošanas datums: 20-Aug-2015
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319224251
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 9241
  • Izdošanas datums: 20-Aug-2015
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319224251

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015.

The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware.
Identity-Based Encryption
Identity-Based Lossy Encryption from Learning with Errors
3(18)
Jingnan He
Bao Li
Xianhui Lu
Dingding Jia
Haiyang Xue
Xiaochao Sun
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
21(20)
Jae Hong Seo
Keita Emura
Elliptic Curve Cryptography
Invalid Curve Attacks in a GLS Setting
41(15)
Taechan Kim
Mehdi Tibouchi
New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates
56(11)
Wei Yu
Kwang Ho Kim
Myong Song Jo
Factoring
Implicit Factorization of RSA Moduli Revisited (Short Paper)
67(12)
Liqiang Peng
Lei Hu
Yao Lu
Zhangjie Huang
Jun Xu
Symmetric Cryptanalysis
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl--256 and Studies on Several Truncation Patterns for AES-like Compression Functions
79(18)
Bingke Ma
Bao Li
Ronglin Hao
Xiaoqian Li
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s
97(18)
Siwei Sun
Lei Hu
Kexin Qiao
Xiaoshuang Ma
Jinyong Shan
Ling Song
Provable Security
NM-CPA Secure Encryption with Proofs of Plaintext Knowledge
115(20)
Ben Smyth
Yoshikazu Hanatani
Hirofumi Muratani
Improvement of UC Secure Searchable Symmetric Encryption Scheme
135(18)
Shunsuke Taketani
Wakaha Ogata
Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model
153(22)
Tingting Zhang
Hongda Li
LWE-Based Encryption
LWE-Based FHE with Better Parameters
175(18)
Fuqun Wang
Kunpeng Wang
Bao Li
Improved Efficiency of MP12
193(20)
Fuyang Fang
Bao Li
Xianhui Lu
Xiaochao Sun
Secret Sharing
Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
213(12)
Hidetaka Hoshino
Satoshi Obana
Privacy-Preserving and Anonymity
k-Anonymous Microdata Release via Post Randomisation Method
225(17)
Dai Ikarashi
Ryo Kikuchi
Koji Chida
Katsumi Takahashi
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data
242(20)
Tadanori Teruya
Koji Nuida
Kana Shimizu
Goichiro Hanaoka
Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes
262(19)
Shahidatul Sadiah
Toru Nakanishi
Nobuo Funabiki
Secure Protocol
Secure Multi-Party Computation Using Polarizing Cards
281(20)
Kazumasa Shinagawa
Takaaki Mizuki
Jacob Schuldt
Koji Nuida
Naoki Kanayama
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Systems Security
An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks
301(15)
Takaya Ezaki
Tomohiro Date
Hiroyuki Inoue
Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data
316(19)
Tong Liu
Yazhe Wang
Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)
335(12)
Reina Yagasaki
Kazuo Sakiyama
Security in Hardware
Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper)
347(10)
Qinglong Zhang
Zongbin Liu
Cunqing Ma
Jiwu Jing
Author Index 357