What is included with this book?
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 | p. 1 |
Generalized Security Analysis of the Random Key Bits Leakage Attack | p. 13 |
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher | p. 28 |
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward | p. 40 |
Known-Key Distinguisher on Round-Reduced 3D Block Cipher | p. 55 |
Identity-Based Signcryption from Identity-Based Cryptography | p. 70 |
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts | p. 84 |
Solving a DLP with Auxiliary Input with the ¿-Algorithm | p. 98 |
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems | p. 109 |
A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage | p. 121 |
Rule Indexing for Efficient Intrusion Detection Systems | p. 136 |
Security Data Extraction from LEC 61850 ACSI Models for Network and System Management | p. 142 |
Lightweight Middleware-Based ZigBee Security in Building Energy Management System | p. 151 |
A Map-Layer-Based Access Control Model | p. 157 |
Application Authentication for Hybrid Services of Broadcasting and Communications Networks | p. 171 |
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols | p. 187 |
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks | p. 203 |
Mutual Private Set Intersection with Linear Complexity | p. 219 |
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs | p. 232 |
Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportation | p. 242 |
Exploiting Routing Tree Construction in CTP | p. 256 |
Author Index | p. 271 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.