Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 8544
  • Izdošanas datums: 05-Jul-2014
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319083445
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 8544
  • Izdošanas datums: 05-Jul-2014
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319083445

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.
Cryptanalysis
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE
1(16)
Yanfeng Wang
Wenling Wu
Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1
17(17)
Bungo Taga
Shiho Moriai
Kazumaro Aoki
Some Insights into Differential Cryptanalysis of Grain v1
34(16)
Subhadeep Banik
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations
50(16)
Petr Susil
Pouyan Sepehrdad
Serge Vaudenay
Cryptographic Protocols
Strongly Simulation-Extractable Leakage-Resilient NIZK
66(16)
Yuyu Wang
Keisuke Tanaka
A Secure Three-Party Computational Protocol for Triangle Area
82(16)
Liang Liu
Xiaofeng Chen
Wenjing Lou
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
98(17)
Pratish Datta
Ratna Dutta
Sourav Mukhopadhyay
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage
115(16)
Zheli Liu
Jin Li
Xiaofeng Chen
Jun Yang
Chunfu Jia
Cryptanalysis
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets
131(17)
Xiao Zhong
Mingsheng Wang
Bin Zhang
Shengbao Wu
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012
148(14)
Yanbin Pan
Yingpu Deng
Further Research on N-1 Attack against Exponentiation Algorithms
162(14)
Zhaojing Ding
Wei Guo
Liangjian Su
Jizeng Wei
Haihua Gu
Cryptanalysis of RSA with Multiple Small Secret Exponents
176(16)
Atsushi Takayasu
Noboru Kunihiro
Fine-grain Cryptographic Protocols
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation
192(17)
Mingwu Zhang
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model
209(17)
Y. Sreenivasa Rao
Ratna Dutta
Incrementally Executable Signcryptions
226(16)
Dan Yamamoto
Hisayoshi Sato
Yasuko Fukuzawa
Hierarchical Identity-Based Broadcast Encryption
242(16)
Weiran Liu
Jianwei Liu
Qianhong Wu
Bo Qin
Key Exchange
Continuous After-the-Fact Leakage-Resilient Key Exchange
258(16)
Janaka Alawatugoda
Colin Boyd
Douglas Stebila
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited
274(16)
Yu Chen
Qiong Huang
Zongyang Zhang
Fundamentals
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption
290(16)
Masayuki Fukumitsu
Shingo Hasegawa
Shuji Isobe
Hiroki Shizuya
ELmE : A Misuse Resistant Parallel Authenticated Encryption
306(16)
Nilanjan Datta
Mridul Nandi
Lattices and Homomorphic Encryption
Lattice Decoding Attacks on Binary LWE
322(16)
Shi Bai
Steven D. Galbraith
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption
338(16)
Masaya Yasuda
Takeshi Shimoyama
Jun Kogure
Kazuhiro Yokoyama
Takeshi Koshiba
Applications
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System
354(16)
Zhongwen Zhang
Yuewu Wang
Jiwu Jing
Qiongxiao Wang
Lingguang Lei
A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission
370(16)
Qinglong Zhang
Zongbin Liu
Miao Li
Ji Xiang
Jiwu Jing
Another Look at Privacy Threats in 3G Mobile Telephony
386(11)
Mohammed Shafiul Alam Khan
Chris J. Mitchell
ExBLACR: Extending BLACR System
397(16)
Weijin Wang
Dengguo Feng
Yu Qin
Jianxiong Shao
Li Xi
Xiaobo Chu
Short Papers
A Semantics-Aware Classification Approach for Data Leakage Prevention
413(9)
Sultan Alneyadi
Elankayer Sithirasenan
Vallipuram Muthukkumarasamy
Route 66: Passively Breaking All GSM Channels
422(8)
Philip S. Vejre
Andrey Bogdanov
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones
430(8)
Yogachandran Rahulamathavan
Veelasha Moonsamy
Lynn Batten
Su Shunliang
Muttukrishnan Rajarajan
Running Multiple Androids on One ARM Platform
438(8)
Zhijiao Zhang
Lei Zhang
Yu Chen
Yuanchun Shi
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android
446(8)
Xingmin Cui
Da Yu
Patrick Chan
Lucas C.K. Hui
S.M. Yiu
Sihan Qing
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2
454(9)
Long Wen
Meiqin Wang
Author Index 463