did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642210303

Information Security Practice and Experience

by ;
  • ISBN13:

    9783642210303

  • ISBN10:

    3642210309

  • Format: Paperback
  • Copyright: 2011-07-14
  • Publisher: Springer Verlag
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $99.99

Summary

This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.

Table of Contents

Public Key Encryption
Public-Key Encryptions Tolerating Adaptive and Composable Adversariesp. 1
Encryption Simulatability Reconsideredp. 14
Fully Secure Cipertext-Policy Hiding CP-ABEp. 24
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemesp. 40
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertextsp. 55
Cloud Security
Toward Trustworthy Clouds' Internet Scale Critical Infrastructurep. 71
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystemsp. 83
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and fine-Grained Access Control in Cloud Computingp. 98
Security Applications
Privacy Enhanced Access Control by Means of Policy Blindingp. 108
Policy- Based Authentication for Mobile Agentsp. 123
Lightweight Delegated Subset Test with Privacy Protectionp. 138
Post-quantum Cryptography and Side-Channel Attack
Improving BDD Cryptosystems in General Latticesp. 152
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Schemep. 168
A Novel Group Signature Scheme Based on MPKCp. 181
How to Characterize Side-Channel Leakages More Accurately?p. 196
Block Ciphers and MACs
New Impossible Differential and Known-Key Distinguishers for the 3D Cipherp. 208
Meet-in the-Middle Attack on 8 Rounds of the AES Block Cipher Yoni under 192 Key Bitp. 222
BCBC: A More Efficient MAC Algorithmp. 233
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designsp. 247
Signature, Secrete Sharing and Traitor Tracing
Short Convertible Undeniable Signature in the Standard Modelp. 257
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Schemep. 273
An Efficient Group-Based Secret Sharing Schemep. 288
Traitor Tracing against Public Collaborationp. 302
System Security and Network Security
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modulesp. 317
Sanitizing Microdata without Leak: Combining Preventive and Curative Actionsp. 333
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Hostp. 343
A Model for Constraint and Delegation Managementp. 362
Security Protocols
Non-black-Box Computation of Linear Regression Protocols with Malicious Adversariesp. 372
A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocolsp. 386
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardwarep. 401
Analysis and Improvement of an Authenticated Key Exchange Protocolp. 417
Another Elliptic Curve Model for Paster Pairing Computationp. 432
Author Indexp. 447
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program