Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 9476
  • Izdošanas datums: 19-Nov-2015
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319268231
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 47,58 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 9476
  • Izdošanas datums: 19-Nov-2015
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319268231
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. 





The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.
Internet of Things and Privacy
PUD A - Privacy and Unforgeability for Data Aggregation
3(16)
Iraklis Leontiadis
Kaoutar Elkhiyaoui
Melek Onen
Refik Molva
A Security Framework for Internet of Things
19(13)
Imane Bouij-Pasquier
Anas Abou El Kalam
Abdellah Ait Ouahman
Mina De Montfort
Privacy-Aware Authentication in the Internet of Things
32(11)
Hannes Gross
Marko Holbl
Daniel Slamanig
Raphael Spreitzer
Password-Based Authentication
Security of Linear Secret-Sharing Schemes Against Mass Surveillance
43(16)
Irene Giacomelli
Ruxandra F. Olimid
Samuel Ranellucci
Secure Set-Based Policy Checking and Its Application to Password Registration
59(16)
Changyu Dong
Franziskus Kiefer
SEPM: Efficient Partial Keyword Search on Encrypted Data
75(20)
Yutaka Kawai
Takato Hirano
Yoshihiro Koseki
Tatsuji Munaka
Attacks and Malicious Code
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals
95(16)
S. Abhishek Anand
Prakash Shrestha
Nitesh Saxena
iDeFEND: Intrusion Detection Framework for Encrypted Network Data
111(8)
Fatih Kilic
Claudia Eckert
On the Weaknesses of PBKDF2
119(10)
Andrea Visconti
Simone Bossi
Hany Ragab
Alexandro Cold
Security Modeling and Verification
Verifiable Random Functions from (Leveled) Multilinear Maps
129(15)
Bei Liang
Hongda Li
Jinyong Chang
A Formal Environment for MANET Organization and Security
144(16)
Aida Ben Chehida Douss
Ryma Abassi
Nihel Ben Youssef
Sihem Guemara El Fatmi
Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme
160(19)
Helger Lipmaa
Kateryna Pavlyk
Secure Multi-party Computation
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
179(18)
Ryo Kikuchi
Koji Chida
Dai Ikarashi
Koki Hamada
Bandwidth-Optimized Secure Two-Party Computation of Minima
197(17)
Jan Henrik Ziegeldorf
Jens Hiller
Martin Heme
Hanno Wirtz
Klaus Wehrle
Outsourcing Secure Two-Party Computation as a Black Box
214(11)
Henry Carter
Benjamin Mood
Patrick Traynor
Kevin Butler
Cryptography and VPNs
What Users Should Know About Full Disk Encryption Based on LUKS
225(13)
Simone Bossi
Andrea Visconti
Q-OpenVPN: A New Extension of Open VPN Based on a Quantum Scheme for Authentication and Key Distribution
238(10)
Aymen Ghilen
Mostafa Azizi
Ridha Bouallegue
An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell
Enterprise Networks
248(9)
Maroua Gharam
Meriem Salhi
Noureddine Boudriga
Author Index 257