Public Key Encryption | |
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries | p. 1 |
Encryption Simulatability Reconsidered | p. 14 |
Fully Secure Cipertext-Policy Hiding CP-ABE | p. 24 |
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes | p. 40 |
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts | p. 55 |
Cloud Security | |
Toward Trustworthy Clouds' Internet Scale Critical Infrastructure | p. 71 |
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems | p. 83 |
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and fine-Grained Access Control in Cloud Computing | p. 98 |
Security Applications | |
Privacy Enhanced Access Control by Means of Policy Blinding | p. 108 |
Policy- Based Authentication for Mobile Agents | p. 123 |
Lightweight Delegated Subset Test with Privacy Protection | p. 138 |
Post-quantum Cryptography and Side-Channel Attack | |
Improving BDD Cryptosystems in General Lattices | p. 152 |
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme | p. 168 |
A Novel Group Signature Scheme Based on MPKC | p. 181 |
How to Characterize Side-Channel Leakages More Accurately? | p. 196 |
Block Ciphers and MACs | |
New Impossible Differential and Known-Key Distinguishers for the 3D Cipher | p. 208 |
Meet-in the-Middle Attack on 8 Rounds of the AES Block Cipher Yoni under 192 Key Bit | p. 222 |
BCBC: A More Efficient MAC Algorithm | p. 233 |
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs | p. 247 |
Signature, Secrete Sharing and Traitor Tracing | |
Short Convertible Undeniable Signature in the Standard Model | p. 257 |
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme | p. 273 |
An Efficient Group-Based Secret Sharing Scheme | p. 288 |
Traitor Tracing against Public Collaboration | p. 302 |
System Security and Network Security | |
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules | p. 317 |
Sanitizing Microdata without Leak: Combining Preventive and Curative Actions | p. 333 |
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host | p. 343 |
A Model for Constraint and Delegation Management | p. 362 |
Security Protocols | |
Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries | p. 372 |
A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols | p. 386 |
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware | p. 401 |
Analysis and Improvement of an Authenticated Key Exchange Protocol | p. 417 |
Another Elliptic Curve Model for Paster Pairing Computation | p. 432 |
Author Index | p. 447 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.