Applied cryptography and network security : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings /: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. (2017)
- Record Type:
- Book
- Title:
- Applied cryptography and network security : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings /: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. (2017)
- Main Title:
- Applied cryptography and network security : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
- Other Titles:
- ACNS 2017
- Further Information:
- Note: Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi (eds.).
- Editors:
- Gollmann, Dieter
Professor, Miyaji, Atsuko
Kikuchi, Hiroaki, 1965- - Other Names:
- ACNS (Conference), 15th
- Contents:
- Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography -- Simple Security Definitions for and Constructions of 0-RTT Key Exchange -- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF -- Secure and Efficient Pairing at 256-bit Security Level -- Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices -- Are You Lying: Validating the Time-Location of Outdoor Images -- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks -- A Pilot Study of Multiple Password Interference between Text and Map-based Passwords -- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security -- A Novel GPU-Based Implementation of the Cube Attack -- Preliminary Results Against Trivium -- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY -- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables -- An experimental study of the BDD approach for the search LWE problem -- Efficiently Obfuscating Re-Encryption Program under DDH Assumption -- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease -- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers -- Side-Channel Attacks meet Secure Network Protocols -- Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes -- Forward-Secure SearchableSampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography -- Simple Security Definitions for and Constructions of 0-RTT Key Exchange -- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF -- Secure and Efficient Pairing at 256-bit Security Level -- Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices -- Are You Lying: Validating the Time-Location of Outdoor Images -- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks -- A Pilot Study of Multiple Password Interference between Text and Map-based Passwords -- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security -- A Novel GPU-Based Implementation of the Cube Attack -- Preliminary Results Against Trivium -- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY -- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables -- An experimental study of the BDD approach for the search LWE problem -- Efficiently Obfuscating Re-Encryption Program under DDH Assumption -- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease -- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers -- Side-Channel Attacks meet Secure Network Protocols -- Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes -- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs -- Bounds in Various Generalized Settings of the Discrete Logarithm Problem -- An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis -- Accountable Storage -- Maliciously Secure Multi-Client ORAM -- Legacy-Compliant Data Authentication for Industrial Control System Traffic -- Multi-Client Oblivious RAM Secure Against Malicious Servers -- Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols -- Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) -- How to Achieve Bounded Key Dependent Message Security -- Signature Schemes with Randomized Verification -- SCRAPE: Scalable Randomness Attested by Public Entities -- cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation -- Almost Optimal Oblivious Transfer from QA-NIZK -- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xvi, 710 pages), illustrations
- Subjects:
- 005.8/2
Computer science
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Cloud computing -- Congresses
Cloud computing
Computer networks -- Security measures
Data encryption (Computer science)
Computer Science
Systems and Data Security
Data Encryption
Security
Computer Communication Networks
Software Engineering
Information Systems Applications (incl. Internet)
Computers -- Security -- General
Computers -- Hardware -- Network Hardware
Computers -- Software Development & Engineering -- General
Computers -- Information Technology
Coding theory & cryptology
Computer security
Network hardware
Software Engineering
Information retrieval
Computer security
Data encryption (Computer science)
Data protection
Computer Communication Networks
Software engineering
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319612041
3319612042 - Related ISBNs:
- 9783319612034
3319612034 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed July 6, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.373636
- Ingest File:
- 02_354.xml