Atnaujinkite slapukų nuostatas

El. knyga: Information Security: 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings

Edited by , Edited by , Edited by
  • Formatas: PDF+DRM
  • Serija: Security and Cryptology 7001
  • Išleidimo metai: 13-Oct-2011
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783642248610
  • Formatas: PDF+DRM
  • Serija: Security and Cryptology 7001
  • Išleidimo metai: 13-Oct-2011
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783642248610

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
Attacks
Replacement Attacks on Behavior Based Software Birthmark
1(16)
Zhi Xin
Huiyu Chen
Xinche Wang
Peng Liu
Sencun Zhu
Bing Mao
Li Xie
Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders
17(15)
Aggelos Kiayias
Serdar Pehlivanoglu
How to Find Short RC4 Colliding Key Pairs
32(15)
Jiageng Chen
Atsuko Miyaji
Protocols
A Formal Approach to Distance-Bounding RFID Protocols
47(16)
Ulrich Durholz
Marc Fischlin
Michael Kasper
Cristina Onete
MASHA - Low Cost Authentication with a New Stream Cipher
63(16)
Shinsaku Kiyomoto
Matt Henricksen
Wun-She Yap
Yuto Nakano
Kazuhide Fukushima
Toward Pairing-Free Certificateless Authenticated Key Exchanges
79(16)
Hu Xiong
Qianhong Wu
Zhong Chen
Public-Key Cryptosystems
Security Analysis of an RSA Key Generation Algorithm with a Large Private Key
95(7)
Fanyu Kong
Jia Yu
Lei Wu
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption
102(17)
Keita Emura
Atsuko Miyaji
Kazumasa Omote
The n-Diffie-Hellman Problem and Its Applications
119(16)
Liqun Chen
Yu Chen
Network Security
RatBot Anti-enumeration Peer-to-Peer Botnets
135(17)
Guanhua Yan
Songqing Chen
Stephan Eidenbenz
Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
152(16)
Ge Zhang
Simone Fischer-Hubner
Software Security
Multi-stage Binary Code Obfuscation Using Improved Virtual Machine
168(14)
Hui Fang
Yongdong Wu
Shuhong Wang
Yin Huang
Detection and Analysis of Cryptographic Data Inside Software
182(15)
Ruoxu Zhao
Dawu Gu
Juanru Li
Ran Yu
System Security
Sudo Web: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms
197(16)
Georgios Kontaxis
Michalis Polychronakis
Evangelos P. Markatos
Hello rootKitty: A Lightweight Invariance-Enforcing Framework
213(16)
Francesco Gadaleta
Nick Nikiforakis
Yves Younan
Wouter Joosen
Opacity Analysis in Trust Management Systems
229(17)
Moritz Y. Becker
Masoud Koleini
Database Security
On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints
246(16)
Joachim Biskup
Marcel Preuß
Lena Wiese
Round-Efficient Oblivious Database Manipulation
262(16)
Sven Laur
Jan Willemson
Bingsheng Zhang
A Privacy-Preserving Join on Outsourced Database
278(15)
Sha Ma
Bo Yang
Kangshun Li
Feng Xia
Privacy
APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks
293(16)
Lei Zhang
Qianhong Wu
Bo Qin
Josep Domingo-Ferrer
Assessing Location Privacy in Mobile Communication Networks
309(16)
Klaus Rechert
Konrad Meier
Benjamin Greschbach
Dennis Wehrle
Dirk von Suchodoletz
How Much Is Enough? Choosing ε for Differential Privacy
325(16)
Jaewoo Lee
Chris Clifton
Digital Signatures
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model With Tighter Security
341(14)
Yuan Zhou
Haifeng Qian
Xiangxue Li
An Efficient Construction of Time-Selective Convertible Undeniable Signatures
355(17)
Qiong Huang
Duncan S. Wong
Willy Susilo
Bo Yang
Efficient Fail-Stop Signatures from the Factoring Assumption
372(15)
Atefeh Mashatan
Khaled Ouafi
Author Index 387