Atjaunināt sīkdatņu piekrišanu

Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 1st ed. 2016 [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 668 pages, height x width: 235x155 mm, 110 Illustrations, black and white; XIV, 668 p. 110 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 9696
  • Izdošanas datums: 10-Jun-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319395548
  • ISBN-13: 9783319395548
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 668 pages, height x width: 235x155 mm, 110 Illustrations, black and white; XIV, 668 p. 110 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 9696
  • Izdošanas datums: 10-Jun-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319395548
  • ISBN-13: 9783319395548
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.
ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. 
Authentication and Key Establishment
On the Security of the Algebraic Eraser Tag Authentication Protocol
3(15)
Simon R. Blackburn
M.J.B. Robshow
A Cryptographic Analysis of UMTS/LTE AKA
18(18)
Stephanie Alt
Pierre-Alain Fouque
Gilles Macario-rat
Cristina Onete
Benjamin Richard
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token
36(22)
Ian Goldberg
Graeme Jenkinson
Frank Stajano
Two More Efficient Variants of the J-PAKE Protocol
58(19)
Jean Lancrenon
Marjan Skrobot
Qiang Tang
Hash-Based TPM Signatures for the Quantum World
77(20)
Megumi Ando
Joshua D. Guttman
Alberto R. Papaleo
John Scire
Signatures with Advanced Properties
Fuzzy Signatures: Relaxing Requirements and a New Construction
97(20)
Takahiro Matsuda
Kenta Takahashi
Takao Murakami
Goichiro Hanaoka
Foundations of Fully Dynamic Group Signatures
117(20)
Jonathan Bootle
Andrea Cerulli
Pyrros Chaidos
Essam Ghadafi
Jens Groth
A Lattice-Based Group Signature Scheme with Message-Dependent Opening
137(19)
Benoit Libert
Fabrice Mouhartem
Khoa Nguyen
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
156(19)
Rosario Gennaro
Steven Goldfeder
Arvind Narayanan
Legally Fair Contract Signing Without Keystones
175(18)
Houda Ferradi
Remi Geraud
Diana Maimut
David Naccache
David Pointcheval
DoS Attacks and Network Anomaly Detection
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms
193(19)
Ryan Johnson
Mohamed Elsabagh
Angelos Stavrou
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering
212(19)
Xiejun Ni
Daojing He
Sammy Chan
Farooq Ahmad
Deterministic and Functional Encryption
More Efficient Constructions for Inner-Product Encryption
231(18)
Somindu C. Ramanna
Attribute Based Encryption with Direct Efficiency Tradeoff
249(18)
Nuttapong Attrapadung
Goichiro Hanaoka
Tsutomu Matsumoto
Tadanori Teruya
Shota Yamada
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions
267(18)
Xavier Boyen
Qinyi Li
Offline Witness Encryption
285(19)
Hamza Abusalah
Georg Fuchsbauer
Krzysztof Pietrzak
Deterministic Public-Key Encryption Under Continual Leakage
304(23)
Venkata Koppula
Omkant Pandey
Yannis Rouselakis
Brent Waters
Computing on Encrypted Data
Better Preprocessing for Secure Multiparty Computation
327(19)
Carsten Baum
Ivan Damgard
Tomas Toft
Rasmus Zakarias
Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
346(21)
Berry Schoenmakers
Meilof Veeningen
Niels de Vreede
Verifiable Multi-party Computation with Perfectly Private Audit Trail
367(19)
Edouard Cuvelier
Olivier Pereira
Practical Fault-Tolerant Data Aggregation
386(19)
Krzysztof Grining
Marek Klonowski
Piotr Syga
Accelerating Homomorphic Computations on Rational Numbers
405(22)
Angela Jaschke
Frederik Armknecht
Non-Interactive Proofs and PRFs
New Techniques for Non-interactive Shuffle and Range Arguments
427(18)
Alonso Gonzalez
Carla Rafols
Constrained PRFs for Unbounded Inputs with Short Keys
445(22)
Hamza Abusalah
Georg Fuchsbauer
Symmetric Ciphers
Wide Trail Design Strategy for Binary MixColumns: Enhancing Lower Bound of Number of Active S-boxes
467(18)
Yosuke Todo
Kazumaro Aoki
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
485(15)
Yunwen Liu
Qingju Wang
Vincent Rijmen
Square Attack on 7-Round Kiasu-BC
500(18)
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
518(19)
Kota Kondo
Yu Sasaki
Tetsu Iwata
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
537(24)
Alex Biryukov
Daniel Dinu
Johann Großschadl
Cryptography in Software
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing
561(19)
Pierre Lestringant
Frederic Guihery
Pierre-Alain Fouque
Parallel Implementation of BDD Enumeration for LWE
580(12)
Elena Kirshanova
Alexander May
Friedrich Wiemer
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff
592(19)
Thomas Gougeon
Morgan Barbier
Patrick Lacharme
Gildas Avoine
Christophe Rosenberger
Security for Human Use
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery
611(18)
Mauro Conti
Claudio Guarisco
Riccardo Spolaor
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones
629(19)
Weizhi Meng
Wenjuan Li
Duncan S. Wong
Jianying Zhou
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case
648(19)
Jagmohan Chauhan
Hassan Jameel Asghar
Anirban Mahanti
Mohamed Ali Kaafar
Author Index 667