Security and Cryptography for Networks 9th International Conference SCN 2014 Amalfi Italy September 3 5 2014 Proceedings 1st Edition by Michel Abdalla, Roberto De Prisco- Ebook PDF Instant Download/Delivery: 3319108786, 978-3319108780
Full download Security and Cryptography for Networks 9th International Conference SCN 2014 Amalfi Italy September 3 5 2014 Proceedings 1st Edition after payment
Product details:
ISBN 10: 3319108786
ISBN 13: 978-3319108780
Author: Michel Abdalla, Roberto De Prisco
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation – foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation – implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.
Table of contents:
-
Universally Composable Non-Interactive Key Exchange
-
Forward Secure Non-Interactive Key Exchange
-
Secure Key Exchange and Sessions without Credentials
-
Relaxed Two-to-One Recoding Schemes
-
Obfuscation ⇒ (IND-CPA Security, Circular Security)
-
Invited Talk I
-
Program Obfuscation via Multilinear Maps
-
Pseudorandom Function Extensions
-
Constrained Verifiable Random Functions
-
Publicly Evaluable Pseudorandom Functions and Their Applications
-
On the Classification of Finite Boolean Functions up to Fairness
-
Communication-Efficient MPC for General Adversary Structures
-
Publicly Auditable Secure Multi-Party Computation
-
Reducing the Overhead of MPC over a Large Population
-
Statistics on Password Re-use and Adaptive Strength for Financial Accounts
-
Efficient Network-Based Enforcement of Data Access Rights
-
EyeDecrypt — Private Interactions in Plain Sight
-
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
-
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
-
Functional Encryption and Its Impact on Cryptography
-
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
-
Improved Indifferentiable Security Analysis of PHOTON
-
Faster Maliciously Secure Two-Party Computation Using the GPU
-
Systematizing Secure Computation for Research and Decision Support
-
An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation
-
Efficient NIZK Arguments via Parallel Verification of Benes Networks
-
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
-
On Adaptively Secure Protocols
-
Key-Indistinguishable Message Authentication Codes
-
Interactive Encryption and Message Authentication
-
Homomorphic Signatures and Message Authentication Codes
-
Efficient Proofs of Secure Erasure
-
Proofs of Space: When Space Is of the Essence
-
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
-
On Selective-Opening Attacks against Encryption Schemes
-
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
People also search for:
international conference on security and cryptography for networks
network security and cryptography syllabus
security and networking
cryptography for network security
network security and cryptography fundamentals