Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information Security Practice and Ex...
~
Kikuchi, Hiroaki.
Information Security Practice and Experience = 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Information Security Practice and Experience/ edited by Chunhua Su, Hiroaki Kikuchi.
Reminder of title:
14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings /
other author:
Su, Chunhua.
Description:
XIV, 624 p. 111 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-3-319-99807-7
ISBN:
9783319998077
Information Security Practice and Experience = 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings /
Information Security Practice and Experience
14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings /[electronic resource] :edited by Chunhua Su, Hiroaki Kikuchi. - 1st ed. 2018. - XIV, 624 p. 111 illus.online resource. - Security and Cryptology ;11125. - Security and Cryptology ;9241.
System Security -- Macros Finder: Do You Remember LOVELETTER -- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection -- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification -- Compact Ring Signature in the Standard Model for Blockchain -- Public key cryptography -- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE -- An Almost Non-Interactive Order Preserving Encryption Scheme -- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding -- Searchable and functional encryption -- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits -- Constrained (Verifiable) Pseudorandom Function from Functional Encryption -- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper) -- (Post-quantum) Signature schemes -- Certificateless Public Key Signature Schemes from Standard Algorithms -- A New Design of Online/Offline Signatures Based on Lattice -- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case -- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation -- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures -- Security Protocols -- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes -- Keyword-Based Delegable Proofs of Storage -- A Generic Framework for Accountable Optimistic Fair Exchange Protocol -- Network Security -- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification -- A Two-Stage Classifier Approach for Network Intrusion Detection -- DSH: Deniable Secret Handshake Framework -- Authentication -- Non-adaptive Group-Testing Aggregate MAC Scheme -- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones -- Seeing is believing: authenticating users with what they see and remember -- Side-channel Attacks -- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks -- Recovering Memory Access Sequence with Differential Flush+Reload Attack -- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE -- Security for Cyber-Physical Systems -- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper) -- Regulating IoT messages -- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks -- Security in Mobile Environment -- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare -- Privacy-preserving data collection for mobile phone sensing tasks -- Secure Computation and Data Privacy -- M-ORAM Revisited: Security and Construction Updates -- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM -- (k,l)-clustering for Transactional Data Streams Anonymization -- Cryptographic Protocols -- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion -- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness -- An Efficient and Provably Secure Private Polynomial Evaluation Scheme -- Efficient Traceable Oblivious Transfer and Its Applications.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols. .
ISBN: 9783319998077
Standard No.: 10.1007/978-3-319-99807-7doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information Security Practice and Experience = 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings /
LDR
:05621nam a22004215i 4500
001
989289
003
DE-He213
005
20200705140524.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783319998077
$9
978-3-319-99807-7
024
7
$a
10.1007/978-3-319-99807-7
$2
doi
035
$a
978-3-319-99807-7
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Information Security Practice and Experience
$h
[electronic resource] :
$b
14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings /
$c
edited by Chunhua Su, Hiroaki Kikuchi.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
XIV, 624 p. 111 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
11125
505
0
$a
System Security -- Macros Finder: Do You Remember LOVELETTER -- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection -- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification -- Compact Ring Signature in the Standard Model for Blockchain -- Public key cryptography -- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE -- An Almost Non-Interactive Order Preserving Encryption Scheme -- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding -- Searchable and functional encryption -- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits -- Constrained (Verifiable) Pseudorandom Function from Functional Encryption -- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper) -- (Post-quantum) Signature schemes -- Certificateless Public Key Signature Schemes from Standard Algorithms -- A New Design of Online/Offline Signatures Based on Lattice -- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case -- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation -- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures -- Security Protocols -- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes -- Keyword-Based Delegable Proofs of Storage -- A Generic Framework for Accountable Optimistic Fair Exchange Protocol -- Network Security -- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification -- A Two-Stage Classifier Approach for Network Intrusion Detection -- DSH: Deniable Secret Handshake Framework -- Authentication -- Non-adaptive Group-Testing Aggregate MAC Scheme -- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones -- Seeing is believing: authenticating users with what they see and remember -- Side-channel Attacks -- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks -- Recovering Memory Access Sequence with Differential Flush+Reload Attack -- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE -- Security for Cyber-Physical Systems -- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper) -- Regulating IoT messages -- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks -- Security in Mobile Environment -- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare -- Privacy-preserving data collection for mobile phone sensing tasks -- Secure Computation and Data Privacy -- M-ORAM Revisited: Security and Construction Updates -- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM -- (k,l)-clustering for Transactional Data Streams Anonymization -- Cryptographic Protocols -- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion -- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness -- An Efficient and Provably Secure Private Polynomial Evaluation Scheme -- Efficient Traceable Oblivious Transfer and Its Applications.
520
$a
This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols. .
650
0
$a
Computer security.
$3
557122
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Computers.
$3
565115
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Artificial intelligence.
$3
559380
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Su, Chunhua.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1209235
700
1
$a
Kikuchi, Hiroaki.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
574606
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319998060
776
0 8
$i
Printed edition:
$z
9783319998084
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-319-99807-7
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login