Atnaujinkite slapukų nuostatas

El. knyga: Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings

Edited by , Edited by , Edited by
  • Formatas: PDF+DRM
  • Serija: Security and Cryptology 7232
  • Išleidimo metai: 02-Apr-2012
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783642291012
  • Formatas: PDF+DRM
  • Serija: Security and Cryptology 7232
  • Išleidimo metai: 02-Apr-2012
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783642291012

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.
Digital Signatures
A Pre-computable Signature Scheme with Efficient Verification for RFID
1(16)
Fuchun Guo
Yi Mu
Willy Susilo
Vijay Varadharajan
Redactable Signatures for Independent Removal of Structure and Content
17(17)
Kai Samelin
Henrich C. Pohls
Arne Bilzhause
Joachim Posegga
Hermann de Meer
Public Key Cryptography
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring
34(12)
Xianhui Lu
Bao Li
Qixiang Mei
Yamin Liu
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack
46(17)
Chong-zhi Gao
Dongqing Xie
Baodian Wei
Computational Soundness of Indistinguishability Properties without Computable Parsing
63(17)
Hubert Comon-Lundh
Masami Hagiya
Yusuke Kawamoto
Hideki Sakurada
Cryptanalysis I Differential Attacks
New Impossible Differential Attacks on Camellia
80(17)
Dongxia Bai
Leibo Li
Impossible Differential Attacks on Reduced-Round LBlock
97(12)
Ya Liu
Dawu Gu
Zhiqiang Liu
Wei Li
New Truncated Differential Cryptanalysis on 3D Block Cipher
109(17)
Takuma Koyama
Lei Wang
Yu Sasaki
Kazuo Sakiyama
Kazuo Ohta
Applications I.i Oblivious Transfer
T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings
126(18)
Christian L.F. Corniaux
Hossein Ghodost
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions
144(14)
K. Preetha Mathew
Sachin Vasant
Sridhar Venkatesan
C. Pandu Rangan
Applications I.ii Internet Security (Works-in-Progress)
Towards Fine-Grained Access Control on Browser Extensions
158(12)
Lei Wang
Ji Xiang
Jiwu Jing
Lingchen Zhang
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family
170(12)
Yang-Wai Chow
Willy Susilo
Key Management
High-Entropy Visual Identification for Touch Screen Devices
182(17)
Nathaniel Wesley Filardo
Giuseppe Ateniese
A Framework for Security Analysis of Key Derivation Functions
199(18)
Chuah Chai Wen
Edward Dawson
Juan Manuel Gonzalez Nieto
Leonie Simpson
Applied Cryptography
On the Equivalence of Two Definitions of Visual Cryptography Scheme
217(11)
Teng Guo
Feng Liu
ChuanKun Wu
Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing
228(17)
Naoyuki Shinohara
Takeshi Shimoyama
Takuya Hayashi
Tsuyoshi Takagi
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks
245(14)
Kazuya Izawa
Atsuko Miyaji
Kazumasa Omote
Applications II.i PINs
iPIN and mTAN for Secure eID Applications
259(18)
Johannes Braun
Moritz Horsch
Alexander Wiesmaier
Applications II.ii Fundamentals (Works-in-Progress)
Secure Distributed Computation of the Square Root and Applications
277(12)
Manuel Liedel
Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization
289(12)
Tian Shuo
He Yeping
Ding Baozeng
Cryptanalysis II Fault Attacks and Key Recovery
Structure-Based RSA Fault Attacks
301(18)
Benjamin Michele
Juliane Kramer
Jean-Pierre Seifert
Fault Analysis of the KATAN Family of Block Ciphers
319(18)
Shekh Faisal Abdul-Latip
Mohammad Reza Reyhanitabar
Willy Susilo
Jennifer Seberry
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher
337(16)
Yanfeng Wang
Wenling Wu
Xiaoli Yu
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers
353(16)
Zhenfei Zhang
Thomas Plantard
Willy Susilo
Cryptanalysis III Key Recovery (Works-in-Progress)
Partial Key Exposure on RSA with Private Exponents Larger Than N
369(12)
Marc Joye
Tancretde Lepoint
Linear Cryptanalysis of Reduced-Round ICEBERG
381(12)
Yue Sun
Meiqin Wang
Overcoming Significant Noise: Correlation-Template-Induction Attack
393(12)
An Wang
Man Chen
Zongyue Wang
Yaoling Ding
Author Index 405