Update cookies preferences

E-book: Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 10060
  • Pub. Date: 02-Nov-2016
  • Publisher: Springer International Publishing AG
  • Language: eng
  • ISBN-13: 9783319491516
  • Format - PDF+DRM
  • Price: 55,56 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 10060
  • Pub. Date: 02-Nov-2016
  • Publisher: Springer International Publishing AG
  • Language: eng
  • ISBN-13: 9783319491516

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

Multiple topics in information security.- Information security in technologies.- Information security in systems.- Applications.
Cryptanalysis of Midori 128 Using Impossible Differential Techniques
1(12)
Zhan Chen
Huaifeng Chen
Xiaoyun Wang
The Distribution of 2"-Periodic Binary Sequences with Fixed k-Error Linear Complexity
13(24)
Wenlun Pan
Zhenzhen Bao
Dongdai Lin
Feng Liu
Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013
37(11)
Jingguo Bi
Jiayang Liu
A Spark-Based DDoS Attack Detection Model in Cloud Services
48(17)
Jian Zhang
Yawei Zhang
Pin Liu
Jianbiao He
Security of SM4 Against (Related-Key) Differential Cryptanalysis
65(14)
Jian Zhang
Wenling Wu
Yafei Zheng
KopperCoin -- A Distributed File Storage with Financial Incentives
79(15)
Henning Kopp
Christoph Bosch
Frank Kargl
Practical Signature Scheme from Γ-Protocol
94(16)
Zhoujun Ma
Li Yang
Yunlei Zhao
A Host-Based Detection Method of Remote Access Trojan in the Early Stage
110(12)
Daichi Adachi
Kazumasa Omote
Collision Attacks on CAESAR Second-Round Candidate: ELmD
122(15)
Jian Zhang
Wenling Wu
Yafei Zheng
Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring
137(14)
Hong Wei Siew
Saw Chin Tan
Ching Kwang Lee
Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU
151(16)
Zhiniang Peng
Shaohua Tang
Ju Chen
Chen Wu
Xinglin Zhang
Homomorphically Encrypted Arithmetic Operations Over the Integer Ring
167(15)
Chen Xu
Jingwei Chen
Wenyuan Wu
Yong Feng
A Privacy Preserving Source Verifiable Encryption Scheme
182(12)
Zhongyuan Yao
Yi Mu
Guomin Yang
Structural Evaluation for Simon-Like Designs Against Integral Attack
194(15)
Huiling Zhang
Wenling Wu
RFID Tags Batch Authentication Revisited -- Communication Overhead and Server Computational Complexity Limits
209(15)
Przemyslaw Blaskiewicz
Lukasz Krzywiecki
Piotr Syga
Privacy-Preserving Cloud Auditing with Multiple Uploaders
224(14)
Ge Wu
Yi Mu
Willy Susilo
Fuchun Guo
A Formal Concept of Domain Pseudonymous Signatures
238(17)
Kamil Kluczniak
Lucjan Hanzlik
Miroslaw Kutylowski
Efficient Tag Path Authentication Protocol with Less Tag Memory
255(16)
Hongbing Wang
Yingjiu Li
Zongyang Zhang
Yunlei Zhao
Anonymizing Bitcoin Transaction
271(13)
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Shi-Feng Sun
Xinyi Huang
Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting
284(16)
Guozhu Zhang
Luning Xia
Shijie Jia
Yafei Ji
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree
300(15)
Yaoan Jin
Chunhua Su
Na Ruan
Weijia Jia
Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network
315(15)
Adel Rajab
Chin-Tser Huang
Mohammed Al-Shargabi
Jorge Cobb
Authenticated CAN Communications Using Standardized Cryptographic Techniques
330(14)
Zhuo Wei
Yanjiang Yang
Tieyan Li
Thrifty Zero-Knowledge: When Linear Programming Meets Cryptography
344(10)
Simon Cogliani
Houda Ferradi
Remi Geraud
David Naccache
ARMv8 Shellcodes from `A' to `Z'
354(25)
Hadrien Barral
Houda Ferradi
Remi Geraud
Georges-Axel Jaloyan
David Naccache
Author Index 379