Information Security and Cryptology 10th International Conference Inscrypt 2014 Beijing China December 13 15 2014 Revised Selected Papers 1st Edition by Dongdai Lin,Moti Yung,Jianying Zhou PDF Instant Download/Delivery: 3319167448, 978-3319167442
Full download Information Security and Cryptology 10th International Conference Inscrypt 2014 Beijing China December 13 15 2014 Revised Selected Papers 1st Edition after payment
Product details:
ISBN 10: 3319167448
ISBN 13: 978-3319167442
Author: Dongdai Lin,Moti Yung,Jianying Zhou
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security prools, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.
Table of contents:
An Efficient Privacy-Preserving E-coupon System
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications
Security of Direct Anonymous Authentication Using TPM 2.0 Signature
Revocation in Publicly Verifiable Outsourced Computation
Private Aggregation with Custom Collusion Tolerance
Ring Signatures of Constant Size Without Random Oracles
Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control
Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge
A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC
Optimal Proximity Proofs
Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions
Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization
Fully Homomorphic Encryption with Auxiliary Inputs
Trapdoors for Ideal Lattices with Applications
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails
The Boomerang Attacks on BLAKE and BLAKE2
Second Preimage Analysis of Whirlwind
Boomerang Attack on Step-Reduced SHA-512
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
Rig: A Simple, Secure and Flexible Design for Password Hashing
Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks
Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
A Note on Diem’s Proof
Stand-by Attacks on E-ID Password Authentication
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
A Lightweight Security Isolation Approach for Virtual Machines Deployment
A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors
People also search for:
Information Security and Cryptology 10th International Conference Inscrypt 2014 Beijing China December 13 15 2014 Revised Selected Papers
international conference on information security and cryptology
international cryptology conference
cryptology and information security
information security and intelligence
Tags:
Dongdai Lin,Moti Yung,Jianying Zhou,Information Security,Cryptology