Cryptology and network security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings /
Saved in:
Meeting name: | International Conference on Cryptology and Network Security (12th : 2013 : Parati, Brazil) |
---|---|
Imprint: | Cham : Springer, 2013. |
Description: | 1 online resource (xviii, 349 pages) : illustrations. |
Language: | English |
Series: | Lecture Notes in Computer Science, 0302-9743 ; 8257 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 8257. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11081951 |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | 11081951 | ||
005 | 20170630045001.3 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 131212s2013 sz a o 101 0 eng d | ||
003 | ICU | ||
040 | |a GW5XE |b eng |e rda |e pn |c GW5XE |d ZMC |d OHS |d COO |d OCLCO |d OCLCF |d OCLCQ |d OCLCO |d YDXCP |d OCL |d OCLCO |d EBLCP |d OCLCQ |d OCLCO |d DIBIB |d OCLCO |d JG0 |d DGU | ||
020 | |a 9783319029375 |q (electronic bk.) | ||
020 | |a 3319029371 |q (electronic bk.) | ||
020 | |a 3319029363 |q (Trade Paper) | ||
020 | |a 9783319029368 |q (Trade Paper) | ||
020 | |z 9783319029368 | ||
024 | 7 | |a 10.1007/978-3-319-02937-5 |2 doi | |
035 | |a (OCoLC)865072899 | ||
050 | 4 | |a QA76.9.A25 | |
060 | 4 | |a QA 76.9.A25 | |
072 | 7 | |a URY |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
049 | |a MAIN | ||
111 | 2 | |a International Conference on Cryptology and Network Security |n (12th : |d 2013 : |c Parati, Brazil) |0 http://id.loc.gov/authorities/names/nb2013025073 |1 http://viaf.org/viaf/305449537 | |
245 | 1 | 0 | |a Cryptology and network security : |b 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings / |c Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab (eds.). |
246 | 3 | |a CANS 2013 | |
264 | 1 | |a Cham : |b Springer, |c 2013. | |
300 | |a 1 online resource (xviii, 349 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
490 | 1 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 8257 | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology | |
500 | |a International conference proceedings. | ||
500 | |a Includes author index. | ||
505 | 0 | 0 | |t Cryptanalysis I. |t Differential Attacks on Generalized Feistel Schemes / |r Valérie Nachef, Emmanuel Volte and Jacques Patarin -- |t Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation / |r Bo Zhu, Yin Tan and Guang Gong -- |t Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? / |r Si Gao, Hua Chen and Limin Fan -- |t Zero-Knowledge Protocols. |t Zero Knowledge Proofs from Ring-LWE / |r Xiang Xie, Rui Xue and Minqian Wang -- |t Zero Knowledge with Rubik's Cubes and Non-abelian Groups / |r Emmanuel Volte, Jacques Patarin and Valérie Nachef -- |t Efficient Modular NIZK Arguments from Shift and Product / |r Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang -- |t Distributed Protocols. |t Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model / |r Yong Li and Zheng Yang -- |t Achieving Correctness in Fair Rational Secret Sharing / |r Sourya Joyee De and Asim K. Pal -- |t Network Security and Applications. |t BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis / |r Nizar Kheir and Chirine Wolley -- |t Resource Access Control in the Facebook Model / |r Konstantinos Chronopoulos, Maria Gouseti and Aggelos Kiayias -- |t Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture / |r Babins Shrestha, Nitesh Saxena and Justin Harrison -- |t Advanced Cryptographic Primitives. |t Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition / |r Mihir Bellare and Adam O'Neill -- |t Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions / |r Haiyang Xue [and others] -- |t Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions / |r Veronika Kuchta and Mark Manulis -- |t Cryptanalysis II. |t A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher / |r Tomer Ashur and Orr Dunkelman -- |t Truncated Differential Analysis of Reduced-Round LBlock / |r Sareh Emami [and others] -- |t Verifiable Computation. |t How to Update Documents Verifiably in Searchable Symmetric Encryption / |r Kaoru Kurosawa and Yasuhiro Ohtaki -- |t Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps / |r Liang Feng Zhang and Reihaneh Safavi-Naini. |
520 | |a This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation. | ||
588 | 0 | |a Online resource; title from PDF title page (SpringerLink, viewed November 4, 2013). | |
650 | 0 | |a Data encryption (Computer science) |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008102033 | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101490 | |
650 | 1 | 4 | |a Computer Science. |
650 | 2 | 4 | |a Data Encryption. |
650 | 2 | 4 | |a Systems and Data Security. |
650 | 2 | 4 | |a Computer Communication Networks. |
650 | 2 | 4 | |a Coding and Information Theory. |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
650 | 2 | |a Computer Security. | |
650 | 2 | |a Computer Communication Networks. | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772 | |
655 | 7 | |a Ebook. |2 local | |
655 | 2 | |a Congresses. | |
700 | 1 | |a Abdalla, Michel, |e editor. |0 http://id.loc.gov/authorities/names/nb2009014526 |1 http://viaf.org/viaf/306104952 | |
700 | 1 | |a Nita-Rotaru, Cristina, |e editor. |0 http://id.loc.gov/authorities/names/nb2013023790 |1 http://viaf.org/viaf/305367289 | |
700 | 1 | |a Dahab, Ricardo, |e editor. |0 http://id.loc.gov/authorities/names/nb2013025098 |1 http://viaf.org/viaf/305449557 | |
776 | 0 | 8 | |i Printed edition: |z 9783319029368 |
830 | 0 | |a Lecture notes in computer science ; |v 8257. |x 0302-9743 | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-319-02937-5 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i a749cc2e-9ca6-5253-aeec-71465a509bb6 |s 19c06191-9ea5-58be-8c46-7b1fc8ae7d2d |
928 | |t Library of Congress classification |a QA76.9.A25 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-319-02937-5 |z SpringerLink |g ebooks |i 9892184 |