Applied cryptography and network security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings /

Saved in:
Bibliographic Details
Meeting name:ACNS (Conference) (10th : 2012 : Singapore)
Imprint:Berlin ; New York : Springer, ©2012.
Description:1 online resource.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 7341
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7341.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11076956
Hidden Bibliographic Details
Varying Form of Title:ACNS 2012
Other authors / contributors:Bao, Feng, Dr
Samarati, Pierangela.
Zhou, Jianying.
ISBN:9783642312847
3642312845
3642312837
9783642312830
9783642312830
Notes:Includes bibliographical references and author index.
Summary:This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
Other form:Applied cryptography and network security
Standard no.:10.1007/978-3-642-31284-7

MARC

LEADER 00000cam a2200000Ka 4500
001 11076956
005 20170630045256.2
006 m o d
007 cr cnu---unuuu
008 120626s2012 gw ob 101 0 eng d
003 ICU
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d OCLCQ  |d ZMC  |d E7B  |d OHI  |d OCLCF  |d BEDGE  |d VT2  |d OCLCO  |d NLGGC  |d COO  |d YDXCP  |d AU@  |d OCL  |d OCLCO  |d OCLCQ  |d EBLCP  |d OCLCQ  |d ESU 
066 |c (S 
019 |a 798627646  |a 847998776 
020 |a 9783642312847  |q (electronic bk.) 
020 |a 3642312845  |q (electronic bk.) 
020 |a 3642312837  |q (print) 
020 |a 9783642312830  |q (print) 
020 |z 9783642312830 
024 7 |a 10.1007/978-3-642-31284-7  |2 doi 
035 |a (OCoLC)796783676  |z (OCoLC)798627646  |z (OCoLC)847998776 
050 4 |a QA76.9.A25  |b A26 2012 
084 |a 54.62  |2 bcl 
084 |a 54.32  |2 bcl 
049 |a MAIN 
111 2 |a ACNS (Conference)  |n (10th :  |d 2012 :  |c Singapore)  |0 http://id.loc.gov/authorities/names/nb2012019085  |1 http://viaf.org/viaf/255733452 
245 1 0 |a Applied cryptography and network security :  |b 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings /  |c Feng Bao, Pierangela Samarati, Jianying Zhou (eds.). 
246 3 |a ACNS 2012 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2012. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 7341 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
505 0 0 |6 880-01  |t Security Analysis of a Multi-factor Authenticated Key Exchange Protocol /  |r Feng Hao and Dylan Clarke --  |t Breaking an Animated CAPTCHA Scheme /  |r Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo --  |t Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens /  |r Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel and Cem Paya, et al. --  |t RIKE: Using Revocable Identities to Support Key Escrow in PKIs /  |r Nan Zhang, Jingqiang Lin, Jiwu Jing and Neng Gao --  |t TreVisor /  |r OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks /  |r Tilo Müller, Benjamin Taubmann and Felix C. Freiling --  |t Authenticated Encryption: How Reordering Can Impact Performance /  |r Basel Alomair --  |t Length-Doubling Ciphers and Tweakable Ciphers /  |r Haibin Zhang --  |t Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers /  |r Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng and Chuankun Wu --  |t Security Enhancements by OR-Proof in Identity-Based Identification /  |r Atsushi Fujioka, Taiichi Saito and Keita Xagawa --  |t Identity-Based Extractable Hash Proofs and Their Applications /  |r Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao --  |t On Structural Signatures for Tree Data Structures /  |r Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer --  |t Inner-Product Lossy Trapdoor Functions and Applications /  |r Xiang Xie, Rui Xue and Rui Zhang --  |t On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification /  |r Afonso Arriaga, Manuel Barbosa and Pooya Farshim --  |t Secure Accumulators from Euclidean Rings without Trusted Setup /  |r Helger Lipmaa --  |t Linear Fault Analysis of Block Ciphers /  |r Zhiqiang Liu, Dawu Gu, Ya Liu and Wei Li --  |t Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys /  |r Yuki Asano, Shingo Yanagihara and Tetsu Iwata --  |t Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions /  |r Yu Sasaki and Lei Wang. 
504 |a Includes bibliographical references and author index. 
520 |a This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids. 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490 
650 7 |a Informatique.  |2 eclas 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
653 4 |a Computer science. 
653 4 |a Computer Communication Networks. 
653 4 |a Data structures (Computer science) 
653 4 |a Data encryption (Computer science) 
653 4 |a Coding theory. 
653 4 |a Information Systems. 
653 4 |a Systems and Data Security. 
653 4 |a Management of Computing and Information Systems. 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
700 1 |a Bao, Feng,  |c Dr  |0 http://id.loc.gov/authorities/names/no2008014268  |1 http://viaf.org/viaf/52144814255547718976 
700 1 |a Samarati, Pierangela.  |0 http://id.loc.gov/authorities/names/n99253725  |1 http://viaf.org/viaf/45381466 
700 1 |a Zhou, Jianying.  |0 http://id.loc.gov/authorities/names/n2001103022  |1 http://viaf.org/viaf/50279185 
776 0 |t Applied cryptography and network security  |w (NL-LeOCL)344311023 
830 0 |a Lecture notes in computer science ;  |v 7341. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
856 4 0 |u http://link.springer.com/10.1007/978-3-642-31284-7  |y SpringerLink 
903 |a HeVa 
880 8 0 |6 505-01/(S  |t Zero-Value Point Attacks on Kummer-Based Cryptosystem /  |r Fangguo Zhang, Qiping Lin and Shengli Liu --  |t PICARO -- A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance /  |r Gilles Piret, Thomas Roche and Claude Carlet --  |t Wide Collisions in Practice /  |r Xin Ye and Thomas Eisenbarth --  |t A General Construction for 1-Round δ-RMT and (0, δ)-SMT /  |r Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin and Pengwei Wang --  |t A Prefiltering Approach to Regular Expression Matching for Network Security Systems /  |r Tingwen Liu, Yong Sun, Alex X. Liu, Li Guo and Binxing Fang --  |t iHTTP: Efficient Authentication of Non-confidential HTTP Traffic /  |r Jason Gionta, Peng Ning and Xiaolan Zhang --  |t ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches /  |r Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis and Evangelos P. Markatos --  |t Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations /  |r Minh Tran, Xinshu Dong, Zhenkai Liang and Xuxian Jiang --  |t The Shy Mayor: Private Badges in GeoSocial Networks /  |r Bogdan Carbunar, Radu Sion, Rahul Potharaju and Moussa Ehsan --  |t Detecting Social Spam Campaigns on Twitter /  |r Zi Chu, Indra Widjaja and Haining Wang --  |t A New Framework for Privacy of RFID Path Authentication /  |r Shaoying Cai, Robert H. Deng, Yingjiu Li and Yunlei Zhao --  |t GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol /  |r Panagiotis Rizomiliotis and Stefanos Gritzalis --  |t Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud /  |r Boyang Wang, Baochun Li and Hui Li --  |t SPICE -- Simple Privacy-Preserving Identity-Management for Cloud Environment /  |r Sherman S.M. Chow, Yi-Jun He, Lucas C.K. Hui and Siu Ming Yiu --  |t A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring /  |r Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen and Bao-Shuh P. Lin --  |t Private Computation of Spatial and Temporal Power Consumption with Smart Meters /  |r Zekeriya Erkin and Gene Tsudik. 
929 |a eresource 
999 f f |i 21ccea6a-8922-50c1-8771-a95d9c20928c  |s a12e3227-ca71-5312-96e3-1a87d339e2ee 
928 |t Library of Congress classification  |a QA76.9.A25 A26 2012  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-642-31284-7  |z SpringerLink  |g ebooks  |i 9887136