Atjaunināt sīkdatņu piekrišanu

Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings 1st ed. 2015 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 257 pages, height x width: 235x155 mm, weight: 4102 g, 41 Illustrations, color; X, 257 p. 41 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 9476
  • Izdošanas datums: 20-Nov-2015
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319268228
  • ISBN-13: 9783319268224
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 45,13 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 53,10 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 257 pages, height x width: 235x155 mm, weight: 4102 g, 41 Illustrations, color; X, 257 p. 41 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 9476
  • Izdošanas datums: 20-Nov-2015
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319268228
  • ISBN-13: 9783319268224
Citas grāmatas par šo tēmu:
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. 





The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.
Internet of Things and Privacy
PUD A - Privacy and Unforgeability for Data Aggregation
3(16)
Iraklis Leontiadis
Kaoutar Elkhiyaoui
Melek Onen
Refik Molva
A Security Framework for Internet of Things
19(13)
Imane Bouij-Pasquier
Anas Abou El Kalam
Abdellah Ait Ouahman
Mina De Montfort
Privacy-Aware Authentication in the Internet of Things
32(11)
Hannes Gross
Marko Holbl
Daniel Slamanig
Raphael Spreitzer
Password-Based Authentication
Security of Linear Secret-Sharing Schemes Against Mass Surveillance
43(16)
Irene Giacomelli
Ruxandra F. Olimid
Samuel Ranellucci
Secure Set-Based Policy Checking and Its Application to Password Registration
59(16)
Changyu Dong
Franziskus Kiefer
SEPM: Efficient Partial Keyword Search on Encrypted Data
75(20)
Yutaka Kawai
Takato Hirano
Yoshihiro Koseki
Tatsuji Munaka
Attacks and Malicious Code
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals
95(16)
S. Abhishek Anand
Prakash Shrestha
Nitesh Saxena
iDeFEND: Intrusion Detection Framework for Encrypted Network Data
111(8)
Fatih Kilic
Claudia Eckert
On the Weaknesses of PBKDF2
119(10)
Andrea Visconti
Simone Bossi
Hany Ragab
Alexandro Cold
Security Modeling and Verification
Verifiable Random Functions from (Leveled) Multilinear Maps
129(15)
Bei Liang
Hongda Li
Jinyong Chang
A Formal Environment for MANET Organization and Security
144(16)
Aida Ben Chehida Douss
Ryma Abassi
Nihel Ben Youssef
Sihem Guemara El Fatmi
Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme
160(19)
Helger Lipmaa
Kateryna Pavlyk
Secure Multi-party Computation
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
179(18)
Ryo Kikuchi
Koji Chida
Dai Ikarashi
Koki Hamada
Bandwidth-Optimized Secure Two-Party Computation of Minima
197(17)
Jan Henrik Ziegeldorf
Jens Hiller
Martin Heme
Hanno Wirtz
Klaus Wehrle
Outsourcing Secure Two-Party Computation as a Black Box
214(11)
Henry Carter
Benjamin Mood
Patrick Traynor
Kevin Butler
Cryptography and VPNs
What Users Should Know About Full Disk Encryption Based on LUKS
225(13)
Simone Bossi
Andrea Visconti
Q-OpenVPN: A New Extension of Open VPN Based on a Quantum Scheme for Authentication and Key Distribution
238(10)
Aymen Ghilen
Mostafa Azizi
Ridha Bouallegue
An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell
Enterprise Networks
248(9)
Maroua Gharam
Meriem Salhi
Noureddine Boudriga
Author Index 257