did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642291005

Information Security Practice and Experience : 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings

by ; ;
  • ISBN13:

    9783642291005

  • ISBN10:

    3642291007

  • Format: Paperback
  • Copyright: 2012-04-07
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $99.00

Summary

This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are oranized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.

Table of Contents

Digital Signatures
A Pre-computable Signature Scheme with Efficient Verification for RFIDp. 1
Redactable Signatures for Independent Removal of Structure and Contentp. 17
Public Key Cryptography
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoringp. 34
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attackp. 46
Computational Soundness of Indistinguishability Properties without Computable Parsingp. 63
Cryptanalysis I: Differential Attacks
New Impossible Differential Attacks on Camelliap. 80
Impossible Differential Attacks on Reduced-Round LBlockp. 97
New Truncated Differential Cryptanalysis on 3D Block Cipherp. 109
Applications I.i: Oblivious Transfer
T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settingsp. 126
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptionsp. 144
Applications I.ii: Internet Security (Works-in-Progress)
Towards Fine-Grained Access Control on Browser Extensionsp. 158
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Familyp. 170
Key Management
High-Entropy Visual Identification for Touch Screen Devicesp. 182
A Framework for Security Analysis of Key Derivation Functionsp. 199
Applied Cryptography
On the Equivalence of Two Definitions of Visual Cryptography Schemep. 217
Key Length Estimation of Pairing-Based Cryptosystems Using ¿T Pairingp. 228
Lightweight Intergrity for XOR Network Coding in Wireless Sensor Networksp. 245
Applications II.i: PINs
iPIN and mTAN for Secure eID Applicationsp. 259
Fundamentals (Works-in-Progress)
Secure Distributed Computation of the Square Root and Applicationsp. 277
Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualizationp. 289
Fault Attacks and Key Recovery
Structure-Based RSA Fault Attacksp. 301
Fault Analysis of the KATAN Family of Block Ciphersp. 319
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipherp. 337
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integersp. 353
Key Recovery (Works-in-Progress)
Partial Key Exposure on RSA with Private Exponents Larger Than Np. 369
Linear Cryptanalysis of Reduced-Round ICEBERGp. 381
Overcoming Significant Noise: Correlation-Template-Induction Attackp. 393
Author Indexp. 405
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program