Information Security
-15%
portes grátis
Information Security
21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings
Manulis, Mark; Schneider, Steve; Chen, Liqun
Springer International Publishing AG
08/2018
522
Mole
Inglês
9783319991351
15 a 20 dias
813
Descrição não disponível.
Invited Paper.- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs.- Software Security.- Secure Code Execution: A Generic PUF-driven System Architecture.- Lumus: Dynamically Uncovering Evasive Android Applications.- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software.- How Safe is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification.- Symmetric Ciphers and Cryptanalysis.- Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy.- Automatic Search for Related-key Differential Trails in SIMON-like Block Ciphers Based on MILP.- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails.- Conditional Cube Searching and Applications on Trivium-Variant Ciphers.- Data Privacy and Anonymization.- Practical Attacks on Relational Databases Protected via Searchable Encryption.- A Simple Algorithm for Estimating Distribution Parameters from n-Dimensional Randomized Binary Responses.- Outsourcing and Assisted Computing.- Enforcing Access Control for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection.- Multi-Authority Fast Data Cloud-Outsourcing for Mobile Devices.- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT.- Offline Assisted Group Key Exchange.- Advanced Encryption.- Function-Dependent Commitments for Verifiable Multi-Party Computation.- On Constructing Pairing-free Identity-Based Encryptions.- Multi-Key Homomorphic Proxy Re-Encryption.- Verifiable Decryption for Fully Homomorphic Encryption.- Privacy-Preserving Applications.- Platform-independent Secure Blockchain-Based Voting System.- Privacy in Crowdsourcing: A Systematic Review.- Advanced Signatures.- Anonymous yet Traceable Strong Designated Verifier Signature.- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions.- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation.- Network Security.- Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic.- Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking.- Cyber-risks in the Industrial Internet of Things: towards a method for continuous assessment.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
authentication;cloud computing;computer crime;computer systems;cryptography;cyber security;data mining;data privacy;digital signature;electronic document identification systems;encryption;network security;privacy;public key cryptography;security systems;software engineering;software evaluation;verification;world wide web
Invited Paper.- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs.- Software Security.- Secure Code Execution: A Generic PUF-driven System Architecture.- Lumus: Dynamically Uncovering Evasive Android Applications.- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software.- How Safe is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification.- Symmetric Ciphers and Cryptanalysis.- Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy.- Automatic Search for Related-key Differential Trails in SIMON-like Block Ciphers Based on MILP.- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails.- Conditional Cube Searching and Applications on Trivium-Variant Ciphers.- Data Privacy and Anonymization.- Practical Attacks on Relational Databases Protected via Searchable Encryption.- A Simple Algorithm for Estimating Distribution Parameters from n-Dimensional Randomized Binary Responses.- Outsourcing and Assisted Computing.- Enforcing Access Control for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection.- Multi-Authority Fast Data Cloud-Outsourcing for Mobile Devices.- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT.- Offline Assisted Group Key Exchange.- Advanced Encryption.- Function-Dependent Commitments for Verifiable Multi-Party Computation.- On Constructing Pairing-free Identity-Based Encryptions.- Multi-Key Homomorphic Proxy Re-Encryption.- Verifiable Decryption for Fully Homomorphic Encryption.- Privacy-Preserving Applications.- Platform-independent Secure Blockchain-Based Voting System.- Privacy in Crowdsourcing: A Systematic Review.- Advanced Signatures.- Anonymous yet Traceable Strong Designated Verifier Signature.- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions.- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation.- Network Security.- Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic.- Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking.- Cyber-risks in the Industrial Internet of Things: towards a method for continuous assessment.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
authentication;cloud computing;computer crime;computer systems;cryptography;cyber security;data mining;data privacy;digital signature;electronic document identification systems;encryption;network security;privacy;public key cryptography;security systems;software engineering;software evaluation;verification;world wide web