Muutke küpsiste eelistusi

E-raamat: Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 9241
  • Ilmumisaeg: 20-Aug-2015
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319224251
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 9241
  • Ilmumisaeg: 20-Aug-2015
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319224251

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015.

The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware.
Identity-Based Encryption
Identity-Based Lossy Encryption from Learning with Errors
3(18)
Jingnan He
Bao Li
Xianhui Lu
Dingding Jia
Haiyang Xue
Xiaochao Sun
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
21(20)
Jae Hong Seo
Keita Emura
Elliptic Curve Cryptography
Invalid Curve Attacks in a GLS Setting
41(15)
Taechan Kim
Mehdi Tibouchi
New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates
56(11)
Wei Yu
Kwang Ho Kim
Myong Song Jo
Factoring
Implicit Factorization of RSA Moduli Revisited (Short Paper)
67(12)
Liqiang Peng
Lei Hu
Yao Lu
Zhangjie Huang
Jun Xu
Symmetric Cryptanalysis
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl--256 and Studies on Several Truncation Patterns for AES-like Compression Functions
79(18)
Bingke Ma
Bao Li
Ronglin Hao
Xiaoqian Li
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s
97(18)
Siwei Sun
Lei Hu
Kexin Qiao
Xiaoshuang Ma
Jinyong Shan
Ling Song
Provable Security
NM-CPA Secure Encryption with Proofs of Plaintext Knowledge
115(20)
Ben Smyth
Yoshikazu Hanatani
Hirofumi Muratani
Improvement of UC Secure Searchable Symmetric Encryption Scheme
135(18)
Shunsuke Taketani
Wakaha Ogata
Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model
153(22)
Tingting Zhang
Hongda Li
LWE-Based Encryption
LWE-Based FHE with Better Parameters
175(18)
Fuqun Wang
Kunpeng Wang
Bao Li
Improved Efficiency of MP12
193(20)
Fuyang Fang
Bao Li
Xianhui Lu
Xiaochao Sun
Secret Sharing
Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
213(12)
Hidetaka Hoshino
Satoshi Obana
Privacy-Preserving and Anonymity
k-Anonymous Microdata Release via Post Randomisation Method
225(17)
Dai Ikarashi
Ryo Kikuchi
Koji Chida
Katsumi Takahashi
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data
242(20)
Tadanori Teruya
Koji Nuida
Kana Shimizu
Goichiro Hanaoka
Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes
262(19)
Shahidatul Sadiah
Toru Nakanishi
Nobuo Funabiki
Secure Protocol
Secure Multi-Party Computation Using Polarizing Cards
281(20)
Kazumasa Shinagawa
Takaaki Mizuki
Jacob Schuldt
Koji Nuida
Naoki Kanayama
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Systems Security
An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks
301(15)
Takaya Ezaki
Tomohiro Date
Hiroyuki Inoue
Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data
316(19)
Tong Liu
Yazhe Wang
Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)
335(12)
Reina Yagasaki
Kazuo Sakiyama
Security in Hardware
Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper)
347(10)
Qinglong Zhang
Zongbin Liu
Cunqing Ma
Jiwu Jing
Author Index 357