Muutke küpsiste eelistusi

E-raamat: Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher

; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function.

Signature and Key Management.- Public Key and Identity-Based Encryption.- Searchable Encryption.- Broadcast Encryption.- Mathematical Primitives.- Symmetric Cipher.- Public Key and Identity-Based Encryption.- Biometric Security.- Digital Forensics.- National Security Infrastructure.- Mobile Security.- Network Security.- Pseudo Random/One-Way Function.
Signature and Key Management
One-Round Strong Oblivious Signature-Based Envelope
3(18)
Rongmao Chen
Yi Mu
Willy Susilo
Guomin Yang
Fuchun Guo
Mingwu Zhang
Proxy Signature with Revocation
21(16)
Shengmin Xu
Guomin Yang
Yi Mu
Sha Ma
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures
37(20)
Arcangelo Castiglione
Alfredo De Santis
Barbara Masucci
Francesco Palmieri
Aniello Castiglione
Public Key and Identity-Based Encryption Content-Based Encryption
57(16)
Xiaofen Wang
Yi Mu
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry
73(14)
Zhe Xia
Xiaoyun Yang
Min Xiao
Debiao He
Identity-Based Group Encryption
87(16)
Xiling Luo
Yili Ren
Jingwen Liu
Jiankun Hu
Weiran Liu
Zhen Wang
Wei Xu
Qianhong Wu
Edit Distance Based Encryption and Its Application
103(17)
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Kaitai Liang
Proxy Re-encryption with Delegatable Verifiability
120(14)
Xiaodong Lin
Rongxing Lu
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions
134(19)
Shi-Feng Sun
Udaya Parampalli
Tsz Hon Yuen
Yu Yu
Dawu Gu
Searchable Encryption
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage
153(17)
Tong Li
Zheli Liu
Ping Li
Chunfu Jia
Zoe L. Jiang
Jin Li
Public Key Encryption with Authorized Keyword Search
170(17)
Peng Jiang
Yi Mu
Fuchun Guo
Qiaoyan Wen
Linear Encryption with Keyword Search
187(20)
Shiwei Zhang
Guomin Yang
Yi Mu
Broadcast Encryption
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
207(16)
Kai He
Jian Weng
Man Ho Au
Yijun Mao
Robert H. Deng
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
223(20)
Jianchang Lai
Yi Mu
Fuchun Guo
Willy Susilo
Rongmao Chen
Mathematical Primitives
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
243(15)
Atsushi Takayasu
Noboru Kunihiro
A New Attack on Three Variants of the RSA Cryptosystem
258(11)
Martin Bunder
Abderrahmane Nitaj
Willy Susilo
Joseph Tonien
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
269(16)
Takashi Yamakawa
Goichiro Hanaoka
Noboru Kunihiro
Deterministic Encoding into Twisted Edwards Curves
285(16)
Wei Yu
Kunpeng Wang
Bao Li
Xiaoyang He
Song Tian
Symmetric Cipher
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ
301(16)
Nasour Bagheri
Florian Mendel
Yu Sasaki
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
317(16)
Christian Forler
Eik List
Stefan Lucks
Jakob Wenzel
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
333(14)
Jiageng Chen
Je Sen Teh
Chunhua Su
Azman Samsudin
Junbin Fang
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
347(16)
Kazuhiko Minematsu
Impossible Differential Cryptanalysis of 14-Round Camellia-192
363(16)
Keting Jia
Ning Wang
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
379(16)
Ling Song
Zhangjie Huang
Qianqian Yang
On the Security of the LAC Authenticated Encryption Algorithm
395(14)
Jiqiang Lu
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques
409(18)
Lingyue Qin
Huaifeng Chen
Xiaoyun Wang
Short Papers-Public Key and Identity-Based Encryption Reducing the Key Size of the SRP Encryption Scheme
427(10)
Dung Hoang Duong
Albrecht Petzoldt
Tsuyoshi Takagi
Short Papers-Biometric Security
Biometric Access Control with High Dimensional Facial Features
437(9)
Ying Han Pang
Ean Yee Khor
Shih Yin Ooi
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes
446(11)
Shiran Pan
Shen Yan
Wen-Tao Zhu
Short Papers-Digital Forensics
Interest Profiling for Security Monitoring and Forensic Investigation
457(10)
Min Yang
Fei Xu
Kam-Pui Chow
Short Papers-National Security Infrastructure
Pseudonymous Signature on eIDAS Token -- Implementation Based Privacy Threats
467(14)
Miroslaw Kutylowski
Lucjan Hanzlik
Kamil Kluczniak
Short Papers-Mobile Security
A Feasible No-Root Approach on Android
481(12)
Yao Cheng
Yingjiu Li
Robert H. Deng
Short Papers-Network Security
Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning
493(12)
Timothy Glennan
Christopher Leckie
Sarah M. Erfani
Short Papers-Pseudo Random/One-way Function
A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems
505(10)
Jhordany Rodriguez Parra
Terence Chan
Siu-Wai Ho
Author Index 515