Cryptology and network security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings /

Saved in:
Bibliographic Details
Meeting name:International Conference on Cryptology and Network Security (12th : 2013 : Parati, Brazil)
Imprint:Cham : Springer, 2013.
Description:1 online resource (xviii, 349 pages) : illustrations.
Language:English
Series:Lecture Notes in Computer Science, 0302-9743 ; 8257
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8257.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11081951
Hidden Bibliographic Details
Varying Form of Title:CANS 2013
Other authors / contributors:Abdalla, Michel, editor.
Nita-Rotaru, Cristina, editor.
Dahab, Ricardo, editor.
ISBN:9783319029375
3319029371
3319029363
9783319029368
9783319029368
Notes:International conference proceedings.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed November 4, 2013).
Summary:This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
Other form:Printed edition: 9783319029368
Standard no.:10.1007/978-3-319-02937-5

MARC

LEADER 00000cam a2200000Ii 4500
001 11081951
005 20170630045001.3
006 m o d
007 cr cnu|||unuuu
008 131212s2013 sz a o 101 0 eng d
003 ICU
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d ZMC  |d OHS  |d COO  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d YDXCP  |d OCL  |d OCLCO  |d EBLCP  |d OCLCQ  |d OCLCO  |d DIBIB  |d OCLCO  |d JG0  |d DGU 
020 |a 9783319029375  |q (electronic bk.) 
020 |a 3319029371  |q (electronic bk.) 
020 |a 3319029363  |q (Trade Paper) 
020 |a 9783319029368  |q (Trade Paper) 
020 |z 9783319029368 
024 7 |a 10.1007/978-3-319-02937-5  |2 doi 
035 |a (OCoLC)865072899 
050 4 |a QA76.9.A25 
060 4 |a QA 76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
049 |a MAIN 
111 2 |a International Conference on Cryptology and Network Security  |n (12th :  |d 2013 :  |c Parati, Brazil)  |0 http://id.loc.gov/authorities/names/nb2013025073  |1 http://viaf.org/viaf/305449537 
245 1 0 |a Cryptology and network security :  |b 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings /  |c Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab (eds.). 
246 3 |a CANS 2013 
264 1 |a Cham :  |b Springer,  |c 2013. 
300 |a 1 online resource (xviii, 349 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8257 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
500 |a International conference proceedings. 
500 |a Includes author index. 
505 0 0 |t Cryptanalysis I.  |t Differential Attacks on Generalized Feistel Schemes /  |r Valérie Nachef, Emmanuel Volte and Jacques Patarin --  |t Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation /  |r Bo Zhu, Yin Tan and Guang Gong --  |t Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? /  |r Si Gao, Hua Chen and Limin Fan --  |t Zero-Knowledge Protocols.  |t Zero Knowledge Proofs from Ring-LWE /  |r Xiang Xie, Rui Xue and Minqian Wang --  |t Zero Knowledge with Rubik's Cubes and Non-abelian Groups /  |r Emmanuel Volte, Jacques Patarin and Valérie Nachef --  |t Efficient Modular NIZK Arguments from Shift and Product /  |r Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang --  |t Distributed Protocols.  |t Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model /  |r Yong Li and Zheng Yang --  |t Achieving Correctness in Fair Rational Secret Sharing /  |r Sourya Joyee De and Asim K. Pal --  |t Network Security and Applications.  |t BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis /  |r Nizar Kheir and Chirine Wolley --  |t Resource Access Control in the Facebook Model /  |r Konstantinos Chronopoulos, Maria Gouseti and Aggelos Kiayias --  |t Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture /  |r Babins Shrestha, Nitesh Saxena and Justin Harrison --  |t Advanced Cryptographic Primitives.  |t Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition /  |r Mihir Bellare and Adam O'Neill --  |t Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions /  |r Haiyang Xue [and others] --  |t Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions /  |r Veronika Kuchta and Mark Manulis --  |t Cryptanalysis II.  |t A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher /  |r Tomer Ashur and Orr Dunkelman --  |t Truncated Differential Analysis of Reduced-Round LBlock /  |r Sareh Emami [and others] --  |t Verifiable Computation.  |t How to Update Documents Verifiably in Searchable Symmetric Encryption /  |r Kaoru Kurosawa and Yasuhiro Ohtaki --  |t Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps /  |r Liang Feng Zhang and Reihaneh Safavi-Naini. 
520 |a This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed November 4, 2013). 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Coding and Information Theory. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 2 |a Computer Security. 
650 2 |a Computer Communication Networks. 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
655 7 |a Ebook.  |2 local 
655 2 |a Congresses. 
700 1 |a Abdalla, Michel,  |e editor.  |0 http://id.loc.gov/authorities/names/nb2009014526  |1 http://viaf.org/viaf/306104952 
700 1 |a Nita-Rotaru, Cristina,  |e editor.  |0 http://id.loc.gov/authorities/names/nb2013023790  |1 http://viaf.org/viaf/305367289 
700 1 |a Dahab, Ricardo,  |e editor.  |0 http://id.loc.gov/authorities/names/nb2013025098  |1 http://viaf.org/viaf/305449557 
776 0 8 |i Printed edition:  |z 9783319029368 
830 0 |a Lecture notes in computer science ;  |v 8257.  |x 0302-9743 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
856 4 0 |u http://link.springer.com/10.1007/978-3-319-02937-5  |y SpringerLink 
903 |a HeVa 
929 |a eresource 
999 f f |i a749cc2e-9ca6-5253-aeec-71465a509bb6  |s 19c06191-9ea5-58be-8c46-7b1fc8ae7d2d 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-319-02937-5  |z SpringerLink  |g ebooks  |i 9892184