Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security and Cryptology: 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 10726
  • Izdošanas datums: 12-Feb-2018
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319751603
  • Formāts - EPUB+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 10726
  • Izdošanas datums: 12-Feb-2018
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319751603

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.

The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.

Keynote Speeches
Security and Privacy in the IoT
3(8)
Elisa Bertino
On Crossroads of Privacy Protection
11(10)
Miroslaw Kutylowski
The Dual Role of Smartphones in IoT Security
21(6)
Kui Ren
Cryptographic Protocols and Algorithms
Implementing Indistinguishability Obfuscation Using GGH15
27(17)
Zheng Zhang
Fangguo Zhang
Huang Zhang
From Attack on Feige-Shamir to Construction of Oblivious Transfer
44(21)
Jingyue Yu
Yi Deng
Yu Chen
A New Lattice Sieving Algorithm Base on Angular Locality-Sensitive Hashing
65(16)
Ping Wang
Dongdong Shang
A Simpler Bitcoin Voting Protocol
81(18)
Haibo Tian
Liqing Fu
Jiejie He
Post-Quantum Secure Remote Password Protocol from RLWE Problem
99(18)
Xinwei Gao
Jintai Ding
Jiqiang Liu
Lin Li
Hashing into Twisted Jacobi Intersection Curves
117(24)
Xiaoyang He
Wei Yu
Kunpeng Wang
Digital Signatures
Identity-Based Key-Insulated Aggregate Signatures, Revisited
141(16)
Nobuaki Kitajima
Naoto Yanai
Takashi Nishide
A New Constant-Size Accountable Ring Signature Scheme Without Random Oracles
157(23)
Sudhakar Kumawat
Souradyuti Paul
A Universal Designated Multi-Verifier Transitive Signature Scheme
180(16)
Fei Zhu
Yuexin Zhang
Chao Lin
Wei Wu
Ru Meng
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme
196(15)
Xiaodong Yang
Ping Yang
Faying An
Shudong Li
Caifen Wang
Dengguo Feng
Encryption
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data
211(12)
Xuguang Wu
Yiliang Han
Minqing Zhang
Shuaishuai Zhu
Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes)
223(19)
Geng Wang
Xiao Zhang
Yanmei Li
Fully Homomorphic Encryption Scheme Based on Public Key Compression and Batch Processing
242(18)
Liquan Chen
Ming Lim
Muyang Wang
Leveled FHE with Matrix Message Space
260(18)
Biao Wang
Xueqing Wang
Rui Xue
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext
278(23)
Hanwen Feng
Jianwei Liu
Qianhong Wu
Weiran Liu
Cryptanalysis and Attack
NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries
301(20)
Qing Wang
Juanru Li
Yuanyuan Zhang
Hui Wang
Yikun Hu
Bodong Li
Dawu Gu
A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs
321(21)
Cong Chen
Dongdai Lin
Wei Zhang
Xiaojun Zhou
Cryptanalysis of Acorn in Nonce-Reuse Setting
342(20)
Xiaojuan Zhang
Dongdai Lin
An Improved Method to Unveil Malware's Hidden Behavior
362(21)
Qiang Li
Yunan Zhang
Liya Su
Yang Wu
Xinjian Ma
Zeming Yang
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces
383(21)
Biao Qi
Zhixin Shi
Yan Wang
Jizhi Wang
Qiwen Wang
Jianguo Jiang
Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling
404(23)
Jun Yin
Chuyan Ma
Lijun Lyu
Jian Song
Guang Zeng
Chuangui Ma
Fushan Wei
Meet in the Middle Attack on Type-1 Feistel Construction
427(20)
Yuanhao Deng
Chenhui Jin
Rongjia Li
Applications
Influence of Error on Hamming Weights for ASCA
447(14)
Chujiao Ma
John Chandy
Laurent Michel
Fanghui Liu
Waldemar Cruz
State-of-the-Art: Security Competition in Talent Education
461(21)
Xiu Zhang
Baoxu Liu
Xiaorui Gong
Zhenyu Song
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures
482(18)
Xiangmin Li
Ning Ding
Haining Lu
Dawu Gu
Shanshan Wang
Beibei Xu
Yuan Yuan
Siyun Yan
NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment
500(18)
Chonghua Wang
Zhiyu Hao
Xiaochun Yun
A Method to Enlarge the Design Distance of BCH Codes and Some Classes of Infinite Optimal Cyclic Codes
518(11)
Shanding Xu
Xiwang Cao
Chunming Tang
Author Index 529