Information security : 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings /: 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. (2018)
- Record Type:
- Book
- Title:
- Information security : 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings /: 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. (2018)
- Main Title:
- Information security : 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings
- Other Titles:
- ISC 2018
- Further Information:
- Note: Liqun Chen, Mark Manulis, Steve Schneider (eds.).
- Editors:
- Chen, Liqun
Manulis, Mark
Schneider, S. A (Steve A.) - Other Names:
- ISC (Conference : Information security), 21st
- Contents:
- Invited Paper.- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs.- Software Security.- Secure Code Execution: A Generic PUF-driven System Architecture.- Lumus: Dynamically Uncovering Evasive Android Applications.- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software.- How Safe is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification.- Symmetric Ciphers and Cryptanalysis.- Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy.- Automatic Search for Related-key Differential Trails in SIMON-like Block Ciphers Based on MILP.- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails.- Conditional Cube Searching and Applications on Trivium-Variant Ciphers.- Data Privacy and Anonymization.- Practical Attacks on Relational Databases Protected via Searchable Encryption.- A Simple Algorithm for Estimating Distribution Parameters from n-Dimensional Randomized Binary Responses.- Outsourcing and Assisted Computing.- Enforcing Access Control for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection.- Multi-Authority Fast Data Cloud-Outsourcing for Mobile Devices.- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT.- Offline Assisted Group Key Exchange.- Advanced Encryption.- Function-Dependent Commitments for Verifiable Multi-PartyInvited Paper.- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs.- Software Security.- Secure Code Execution: A Generic PUF-driven System Architecture.- Lumus: Dynamically Uncovering Evasive Android Applications.- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software.- How Safe is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification.- Symmetric Ciphers and Cryptanalysis.- Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy.- Automatic Search for Related-key Differential Trails in SIMON-like Block Ciphers Based on MILP.- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails.- Conditional Cube Searching and Applications on Trivium-Variant Ciphers.- Data Privacy and Anonymization.- Practical Attacks on Relational Databases Protected via Searchable Encryption.- A Simple Algorithm for Estimating Distribution Parameters from n-Dimensional Randomized Binary Responses.- Outsourcing and Assisted Computing.- Enforcing Access Control for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection.- Multi-Authority Fast Data Cloud-Outsourcing for Mobile Devices.- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT.- Offline Assisted Group Key Exchange.- Advanced Encryption.- Function-Dependent Commitments for Verifiable Multi-Party Computation.- On Constructing Pairing-free Identity-Based Encryptions.- Multi-Key Homomorphic Proxy Re-Encryption.- Verifiable Decryption for Fully Homomorphic Encryption.- Privacy-Preserving Applications.- Platform-independent Secure Blockchain-Based Voting System.- Privacy in Crowdsourcing: A Systematic Review.- Advanced Signatures.- Anonymous yet Traceable Strong Designated Verifier Signature.- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions.- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation.- Network Security.- Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic.- Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking.- Cyber-risks in the Industrial Internet of Things: towards a method for continuous assessment. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xi, 522 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computers -- Information Theory
Computers -- Hardware -- General
Computers -- Social Aspects -- Human-Computer Interaction
Computers -- Online Services -- General
Computers -- Programming -- General
Algorithms & data structures
Computer networking & communications
Information technology: general issues
Computer programming / software development
Data protection
Data structures (Computer science)
Computer network architectures
Information systems
Logic design
Computers -- Security -- General
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 9783319991368
3319991361 - Related ISBNs:
- 9783319991351
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed September 7, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.324810
- Ingest File:
- 01_263.xml