Applied cryptography and network security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings /
Saved in:
Meeting name: | ACNS (Conference) (10th : 2012 : Singapore) |
---|---|
Imprint: | Berlin ; New York : Springer, ©2012. |
Description: | 1 online resource. |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 7341 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 7341. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11076956 |
MARC
LEADER | 00000cam a2200000Ka 4500 | ||
---|---|---|---|
001 | 11076956 | ||
005 | 20170630045256.2 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 120626s2012 gw ob 101 0 eng d | ||
003 | ICU | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d OCLCQ |d ZMC |d E7B |d OHI |d OCLCF |d BEDGE |d VT2 |d OCLCO |d NLGGC |d COO |d YDXCP |d AU@ |d OCL |d OCLCO |d OCLCQ |d EBLCP |d OCLCQ |d ESU | ||
066 | |c (S | ||
019 | |a 798627646 |a 847998776 | ||
020 | |a 9783642312847 |q (electronic bk.) | ||
020 | |a 3642312845 |q (electronic bk.) | ||
020 | |a 3642312837 |q (print) | ||
020 | |a 9783642312830 |q (print) | ||
020 | |z 9783642312830 | ||
024 | 7 | |a 10.1007/978-3-642-31284-7 |2 doi | |
035 | |a (OCoLC)796783676 |z (OCoLC)798627646 |z (OCoLC)847998776 | ||
050 | 4 | |a QA76.9.A25 |b A26 2012 | |
084 | |a 54.62 |2 bcl | ||
084 | |a 54.32 |2 bcl | ||
049 | |a MAIN | ||
111 | 2 | |a ACNS (Conference) |n (10th : |d 2012 : |c Singapore) |0 http://id.loc.gov/authorities/names/nb2012019085 |1 http://viaf.org/viaf/255733452 | |
245 | 1 | 0 | |a Applied cryptography and network security : |b 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings / |c Feng Bao, Pierangela Samarati, Jianying Zhou (eds.). |
246 | 3 | |a ACNS 2012 | |
260 | |a Berlin ; |a New York : |b Springer, |c ©2012. | ||
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 7341 | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology | |
505 | 0 | 0 | |6 880-01 |t Security Analysis of a Multi-factor Authenticated Key Exchange Protocol / |r Feng Hao and Dylan Clarke -- |t Breaking an Animated CAPTCHA Scheme / |r Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo -- |t Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens / |r Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel and Cem Paya, et al. -- |t RIKE: Using Revocable Identities to Support Key Escrow in PKIs / |r Nan Zhang, Jingqiang Lin, Jiwu Jing and Neng Gao -- |t TreVisor / |r OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks / |r Tilo Müller, Benjamin Taubmann and Felix C. Freiling -- |t Authenticated Encryption: How Reordering Can Impact Performance / |r Basel Alomair -- |t Length-Doubling Ciphers and Tweakable Ciphers / |r Haibin Zhang -- |t Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers / |r Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng and Chuankun Wu -- |t Security Enhancements by OR-Proof in Identity-Based Identification / |r Atsushi Fujioka, Taiichi Saito and Keita Xagawa -- |t Identity-Based Extractable Hash Proofs and Their Applications / |r Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao -- |t On Structural Signatures for Tree Data Structures / |r Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer -- |t Inner-Product Lossy Trapdoor Functions and Applications / |r Xiang Xie, Rui Xue and Rui Zhang -- |t On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification / |r Afonso Arriaga, Manuel Barbosa and Pooya Farshim -- |t Secure Accumulators from Euclidean Rings without Trusted Setup / |r Helger Lipmaa -- |t Linear Fault Analysis of Block Ciphers / |r Zhiqiang Liu, Dawu Gu, Ya Liu and Wei Li -- |t Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys / |r Yuki Asano, Shingo Yanagihara and Tetsu Iwata -- |t Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions / |r Yu Sasaki and Lei Wang. |
504 | |a Includes bibliographical references and author index. | ||
520 | |a This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids. | ||
650 | 0 | |a Data encryption (Computer science) |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008102033 | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101490 | |
650 | 7 | |a Informatique. |2 eclas | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
653 | 4 | |a Computer science. | |
653 | 4 | |a Computer Communication Networks. | |
653 | 4 | |a Data structures (Computer science) | |
653 | 4 | |a Data encryption (Computer science) | |
653 | 4 | |a Coding theory. | |
653 | 4 | |a Information Systems. | |
653 | 4 | |a Systems and Data Security. | |
653 | 4 | |a Management of Computing and Information Systems. | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772 | |
700 | 1 | |a Bao, Feng, |c Dr |0 http://id.loc.gov/authorities/names/no2008014268 |1 http://viaf.org/viaf/52144814255547718976 | |
700 | 1 | |a Samarati, Pierangela. |0 http://id.loc.gov/authorities/names/n99253725 |1 http://viaf.org/viaf/45381466 | |
700 | 1 | |a Zhou, Jianying. |0 http://id.loc.gov/authorities/names/n2001103022 |1 http://viaf.org/viaf/50279185 | |
776 | 0 | |t Applied cryptography and network security |w (NL-LeOCL)344311023 | |
830 | 0 | |a Lecture notes in computer science ; |v 7341. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-642-31284-7 |y SpringerLink |
903 | |a HeVa | ||
880 | 8 | 0 | |6 505-01/(S |t Zero-Value Point Attacks on Kummer-Based Cryptosystem / |r Fangguo Zhang, Qiping Lin and Shengli Liu -- |t PICARO -- A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance / |r Gilles Piret, Thomas Roche and Claude Carlet -- |t Wide Collisions in Practice / |r Xin Ye and Thomas Eisenbarth -- |t A General Construction for 1-Round δ-RMT and (0, δ)-SMT / |r Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin and Pengwei Wang -- |t A Prefiltering Approach to Regular Expression Matching for Network Security Systems / |r Tingwen Liu, Yong Sun, Alex X. Liu, Li Guo and Binxing Fang -- |t iHTTP: Efficient Authentication of Non-confidential HTTP Traffic / |r Jason Gionta, Peng Ning and Xiaolan Zhang -- |t ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches / |r Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis and Evangelos P. Markatos -- |t Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations / |r Minh Tran, Xinshu Dong, Zhenkai Liang and Xuxian Jiang -- |t The Shy Mayor: Private Badges in GeoSocial Networks / |r Bogdan Carbunar, Radu Sion, Rahul Potharaju and Moussa Ehsan -- |t Detecting Social Spam Campaigns on Twitter / |r Zi Chu, Indra Widjaja and Haining Wang -- |t A New Framework for Privacy of RFID Path Authentication / |r Shaoying Cai, Robert H. Deng, Yingjiu Li and Yunlei Zhao -- |t GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol / |r Panagiotis Rizomiliotis and Stefanos Gritzalis -- |t Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud / |r Boyang Wang, Baochun Li and Hui Li -- |t SPICE -- Simple Privacy-Preserving Identity-Management for Cloud Environment / |r Sherman S.M. Chow, Yi-Jun He, Lucas C.K. Hui and Siu Ming Yiu -- |t A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring / |r Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen and Bao-Shuh P. Lin -- |t Private Computation of Spatial and Temporal Power Consumption with Smart Meters / |r Zekeriya Erkin and Gene Tsudik. |
929 | |a eresource | ||
999 | f | f | |i 21ccea6a-8922-50c1-8771-a95d9c20928c |s a12e3227-ca71-5312-96e3-1a87d339e2ee |
928 | |t Library of Congress classification |a QA76.9.A25 A26 2012 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-642-31284-7 |z SpringerLink |g ebooks |i 9887136 |