Advances in Information and Computer Security
Springer International Publishing (Verlag)
978-3-319-09842-5 (ISBN)
System Security.- Privacy-Friendly Access Control Based on Personal Attributes.- Are You Threatening my Hazards?.- Complicating Process Identification by Replacing Process Information for Attack Avoidance.- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints.- Key Management for Onion Routing in a True Peer to Peer Setting (short paper).- Threshold Cryptography.- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication.- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper).- Secure Multi-party Computation for Elliptic Curves (short paper).- More Constructions of Re-splittable Threshold Public Key Encryption (short paper).- Hardware Security.- How to Effectively Decrease the Resource Requirement in Template Attack?.- Deterministic Hard Fault Attack on Trivium (short paper).- DPA Resilience of Rotation-Symmetric S-boxes.- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering.- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics.- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011.- Improved Linear Cryptanalysis of Reduced-Round MIBS.- Characterization of EME with Linear Mixing.- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper).- Encryption.- Related Key Secure PKE from Hash Proof Systems.- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper).- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).
Erscheint lt. Verlag | 4.8.2014 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 287 p. 62 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 462 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Access Control • authentication • cryptography • Distributed Systems Security • Encryption • formal methods and theory of security • hardware attacks and countermeasures • hardware reverse engineering • hardware security implementation • Intrusion Detection Systems • Key Management • mathematical foundations of cryptography • operating systems security • public key (asymmetric) techniques • Security and Privacy • security in hardware • symmetric cryptography and hash functions • Systems Security • theory of database privacy and security • virtualization and security |
ISBN-10 | 3-319-09842-X / 331909842X |
ISBN-13 | 978-3-319-09842-5 / 9783319098425 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich