My Library

University LibraryCatalogue

Limit search to items available for borrowing or consultation
Result Page: Previous Next
Can't find that book? Try BONUS+
Look for full text

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

Cover Art
Author ACNS (Conference) (11th : 2013 : Banff, Alta.)

Title Applied cryptography and network security : 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013 : proceedings / Michael Jacobson [and others]. (eds.).

Published Berlin ; New York : Springer, ©2013.


Location Call No. Status
Physical description 1 online resource (xiv, 572 pages) : illustrations.
Series Lecture notes in computer science, 0302-9743 ; 7954
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7954. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Springer Lecture Notes in Computer Science
Contents Cloud Cryptography. Transparent, Distributed, and Replicated Dynamic Provable Data Possession / Mohammad Etemad, Alptekin Küpçü -- Client-Controlled Cryptography-as-a-Service in the Cloud / Sören Bleikertz [and others] -- CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing / Yi-Ruei Chen [and others] -- Computing on Authenticated Data for Adjustable Predicates / Björn Deiseroth [and others] -- Secure Computation. Towards Efficient Private Distributed Computation on Unbounded Input Streams / Shlomi Dolev [and others] -- From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting / Sven Laur, Riivo Talviste, Jan Willemson -- Private Database Queries Using Somewhat Homomorphic Encryption / Dan Boneh [and others] -- Hash Function and Block Cipher. BLAKE2: Simpler, Smaller, Fast as MD5 / Jean-Philippe Aumasson [and others].
Cryptophia's Short Combiner for Collision-Resistant Hash Functions / Arno Mittelbach -- Generic Attacks for the Xor of k Random Permutations / Jacques Patarin -- Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist / Yu Sasaki -- Signature. Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles / Xiangxue Li [and others] -- Sequential Aggregate Signatures Made Shorter / Kwangsu Lee, Dong Hoon Lee, Moti Yung -- Group-Oriented Cryptography. How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE / Rikke Bendlin, Sara Krehbiel, Chris Peikert -- Toward Practical Group Encryption / Laila El Aimani, Marc Joye -- System Attack I. Experimental Analysis of Attacks on Next Generation Air Traffic Communication / Matthias Schäfer, Vincent Lenders, Ivan Martinovic -- Launching Generic Attacks on iOS with Approved Third-Party Applications / Jin Han [and others].
Secure Implementation -- Hardware. Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography / Erich Wenger -- Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors / Michael Henson, Stephen Taylor -- Secure Implementation -- Software. NEON Implementation of an Attribute-Based Encryption Scheme / Ana Helena Sánchez, Francisco Rodríguez-Henríquez -- Fast and Maliciously Secure Two-Party Computation Using the GPU / Tore Kasper Frederiksen, Jesper Buus Nielsen -- Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves / Aurore Guillevic -- System Attack II. FROST / Tilo Müller, Michael Spreitzenbarth -- Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware / Alexander Wild, Tim Güneysu, Amir Moradi -- Keystroke Timing Analysis of on-the-fly Web Apps / Chee Meng Tey [and others].
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance / Marc Fischlin, Cristina Onete -- Group-Oriented Systems. CrowdShare: Secure Mobile Resource Sharing / N. Asokan [and others] -- Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System / Filip Zagórski [and others] -- Key Exchange and Leakage Resilience. Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles / Koutarou Suzuki, Kazuki Yoneyama -- Public Key Exchange Using Semidirect Product of (Semi)Groups / Maggie Habeeb [and others] -- Leakage Resilient IBE and IPE under the DLIN Assumption / Kaoru Kurosawa, Le Trieu Phong -- Cryptographic Proof. Batch Proofs of Partial Knowledge / Ryan Henry, Ian Goldberg -- Efficient Signatures of Knowledge and DAA in the Standard Model / David Bernhard, Georg Fuchsbauer, Essam Ghadafi -- Cryptosystems. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes / Olivier Blazy [and others] -- Primeless Factoring-Based Cryptography / Sonia Bogos, Ioana Boureanu, Serge Vaudenay.
Bibliography Includes bibliographical references and author index.
Summary This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.
Other author Jacobson, Michael (Computer scientist)
SpringerLink issuing body.
Subject Data encryption (Computer science) -- Congresses.
Computer networks -- Security measures -- Congresses.
Cloud computing -- Congresses.
Computer science.
Computer Communication Networks.
Data protection.
Data structures (Computer science)
Data encryption (Computer science)
Coding theory.
Information Systems.
Systems and Data Security.
Management of Computing and Information Systems.
Coding and Information Theory.
Electronic books.
Conference papers and proceedings.
Variant Title ACNS 2013
ISBN 9783642389801
Standard Number 10.1007/978-3-642-38980-1