Advances in Information and Computer Security
Springer Berlin (Verlag)
978-3-642-41382-7 (ISBN)
Software and System Security.- Secure Log Transfer by Replacing a Library in a Virtual Machine.- Static Integer Overflow Vulnerability Detection in Windows Binary.- Solving Google's Continuous Audio CAPTCHA with HMM-Based Automatic Speech Recognition.- Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces.- Cryptanalysis.- Differential Power Analysis of MAC-Keccak at Any Key-Length.- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC.- New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA.- Improvement of Faug`ere et al.'s Method to Solve ECDLP.- Privacy and Cloud Computing.- Statistics on Encrypted Cloud Data.- Toward Practical Searchable Symmetric Encryption.- Unconditionally Secure Oblivious Transfer from Real Network Behavior.- Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption.- Public Key Cryptosystems.- Efficient Algorithm for Tate Pairing of Composite Order.- How to Factor N1 and N2 When p1 = p2 mod 2t.- Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption.- Cryptanalysis of the Quaternion Rainbow.- Security Protocols.- On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.- One-Round Authenticated Key Exchange without Implementation Trick.- Attacks to the Proxy Re-Encryption Schemes from IWSEC2011.- Game-Theoretic Security for Bit Commitment.
Erscheint lt. Verlag | 9.10.2013 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 319 p. 53 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 510 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Mathematik | |
Schlagworte | Algorithm analysis and problem complexity • algorithms • Attacks • ciphers • Distributed Systems • Encryption |
ISBN-10 | 3-642-41382-X / 364241382X |
ISBN-13 | 978-3-642-41382-7 / 9783642413827 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich