Автор: Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang Название: Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings Издательство: Springer Год: 2016 ISBN: 978-3319491509 Серия: Lecture Notes in Computer Science Язык: English Формат: pdf Размер: 14 mb Страниц: 380
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.
Cryptanalysis of Midori128 Using Impossible Differential Techniques Zhan Chen, Huaifeng Chen, and Xiaoyun Wang
The Distribution of 2n-Periodic Binary Sequences with Fixed k-Error Linear Complexity Wenlun Pan, Zhenzhen Bao, Dongdai Lin, and Feng Liu
Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013 Jingguo Bi and Jiayang Liu
A Spark-Based DDoS Attack Detection Model in Cloud Services Jian Zhang, Yawei Zhang, Pin Liu, and Jianbiao He
Security of SM4 Against (Related-Key) Differential Cryptanalysis Jian Zhang, Wenling Wu, and Yafei Zheng
KopperCoin – A Distributed File Storage with Financial Incentives Henning Kopp, Christoph B?sch, and Frank Kargl
Practical Signature Scheme from C-Protocol Zhoujun Ma, Li Yang, and Yunlei Zhao
A Host-Based Detection Method of Remote Access Trojan in the Early Stage Daichi Adachi and Kazumasa Omote
Collision Attacks on CAESAR Second-Round Candidate: ELmD Jian Zhang, Wenling Wu, and Yafei Zheng
Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring Hong Wei Siew, Saw Chin Tan, and Ching Kwang Lee
Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU Zhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, and Xinglin Zhang
Homomorphically Encrypted Arithmetic Operations Over the Integer Ring Chen Xu, Jingwei Chen, Wenyuan Wu, and Yong Feng
A Privacy Preserving Source Verifiable Encryption Scheme Zhongyuan Yao, Yi Mu, and Guomin Yang
Structural Evaluation for Simon-Like Designs Against Integral Attack Huiling Zhang and Wenling Wu
RFID Tags Batch Authentication Revisited – Communication Overhead and Server Computational Complexity Limits Przemys?aw B?a?kiewicz, ?ukasz Krzywiecki, and Piotr Syga
Privacy-Preserving Cloud Auditing with Multiple Uploaders Ge Wu, Yi Mu, Willy Susilo, and Fuchun Guo
A Formal Concept of Domain Pseudonymous Signatures Kamil Kluczniak, Lucjan Hanzlik, and Miros?aw Kuty?owski
Efficient Tag Path Authentication Protocol with Less Tag Memory Hongbing Wang, Yingjiu Li, Zongyang Zhang, and Yunlei Zhao
Anonymizing Bitcoin Transaction Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shi-Feng Sun, and Xinyi Huang
Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting Guozhu Zhang, Luning Xia, Shijie Jia, and Yafei Ji
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree Yaoan Jin, Chunhua Su, Na Ruan, and Weijia Jia
Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, and Jorge Cobb
Authenticated CAN Communications Using Standardized Cryptographic Techniques Zhuo Wei, Yanjiang Yang, and Tieyan Li
Thrifty Zero-Knowledge: When Linear Programming Meets Cryptography Simon Cogliani, Houda Ferradi, R?mi G?raud, and David Naccache
ARMv8 Shellcodes from ‘A’ to ‘Z’ Hadrien Barral, Houda Ferradi, R?mi G?raud, Georges-Axel Jaloyan, and David Naccache
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.