Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings.: 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings. Part II (2020)
- Record Type:
- Book
- Title:
- Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings.: 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings. Part II (2020)
- Main Title:
- Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings.
- Other Titles:
- ACNS 2020
- Further Information:
- Note: Edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi.
- Editors:
- (Associate professor), Conti, Mauro
Zhou, Jianying
Casalicchio, Emiliano
Spognardi, Angelo - Other Names:
- ACNS (Conference), 18th
- Contents:
- Part II -- Contents -- Authentication and Biometrics -- A Breach into the Authentication with Built-in Camera (ABC) Protocol -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 ABC Protocol -- 3.2 ABC Protocol Defense Systems -- 3.3 Proposed Attack Scheme -- 4 Experiments -- 4.1 Data Set -- 4.2 Evaluation Details -- 4.3 Results Using Five Images for PRNU Estimation -- 4.4 Results Using One Image for PRNU Estimation -- 5 Discussion -- 5.1 Data Set -- 5.2 Model -- 5.3 Results -- 6 Conclusion -- References A Practical System for Privacy-Preserving Video Surveillance -- 1 Introduction -- 2 Related Work -- 2.1 Face Recognition -- 2.2 Privacy-Preserving Video Surveillance -- 3 Tools -- 3.1 OpenFace -- 3.2 Homomorphic Encryption -- 4 Problem Definition and Threat Model -- 5 System Description -- 5.1 Offline Phase -- 5.2 Similarity Score Computation -- 5.3 Similarity Score Obfuscation -- 5.4 Matching -- 6 Security -- 7 Performance Comparison -- 8 Implementation Details -- 9 Experimental Results -- 10 Conclusions -- References -- Biometric-Authenticated Searchable Encryption -- 1 Introduction 2 Preliminaries and Building Blocks -- 2.1 Cryptographic Building Blocks -- 2.2 Biometric Sampling and Liveness Assumption -- 3 Biometric-Authenticated Keyword Search: Syntax and Definitions -- 3.1 Syntax of BAKS -- 3.2 Security Definitions -- 4 Construction -- 4.1 Efficiency Analysis and Improvements -- 4.2 Extensions with Multiple Keywords -- 4.3 Biometric Update -- 5 Security Analysis -- 6Part II -- Contents -- Authentication and Biometrics -- A Breach into the Authentication with Built-in Camera (ABC) Protocol -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 ABC Protocol -- 3.2 ABC Protocol Defense Systems -- 3.3 Proposed Attack Scheme -- 4 Experiments -- 4.1 Data Set -- 4.2 Evaluation Details -- 4.3 Results Using Five Images for PRNU Estimation -- 4.4 Results Using One Image for PRNU Estimation -- 5 Discussion -- 5.1 Data Set -- 5.2 Model -- 5.3 Results -- 6 Conclusion -- References A Practical System for Privacy-Preserving Video Surveillance -- 1 Introduction -- 2 Related Work -- 2.1 Face Recognition -- 2.2 Privacy-Preserving Video Surveillance -- 3 Tools -- 3.1 OpenFace -- 3.2 Homomorphic Encryption -- 4 Problem Definition and Threat Model -- 5 System Description -- 5.1 Offline Phase -- 5.2 Similarity Score Computation -- 5.3 Similarity Score Obfuscation -- 5.4 Matching -- 6 Security -- 7 Performance Comparison -- 8 Implementation Details -- 9 Experimental Results -- 10 Conclusions -- References -- Biometric-Authenticated Searchable Encryption -- 1 Introduction 2 Preliminaries and Building Blocks -- 2.1 Cryptographic Building Blocks -- 2.2 Biometric Sampling and Liveness Assumption -- 3 Biometric-Authenticated Keyword Search: Syntax and Definitions -- 3.1 Syntax of BAKS -- 3.2 Security Definitions -- 4 Construction -- 4.1 Efficiency Analysis and Improvements -- 4.2 Extensions with Multiple Keywords -- 4.3 Biometric Update -- 5 Security Analysis -- 6 Conclusion -- References -- BioLocker: A Practical Biometric Authentication Mechanism Based on 3D Fingervein -- 1 Introduction -- 2 Infrastructure Specification -- 3 Protocols -- 3.1 Access Control Protocols 3.2 Enrollment Protocol -- 4 Biometric Algorithms -- 5 Security Analysis -- 6 Implementation Results -- 7 Conclusion -- References -- Privacy and Anonymity -- Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Intel SGX -- 3.2 Dynamic Searchable Symmetric Encryption -- 4 Our Proposed Schemes -- 4.1 System Overview -- 4.2 Assumptions and Threat Models -- 4.3 Design Intuition -- 4.4 SGX-SE1 Construction -- 4.5 SGX-SE2 Construction -- 4.6 Security Analysis -- 5 Implementation and Evaluation 5.1 Performance Evaluation on the Synthesis Dataset -- 5.2 Performance Evaluation on the Enron Dataset -- 6 Conclusion -- References -- Cluster-Based Anonymization of Knowledge Graphs -- 1 Introduction -- 2 Anonymizing Knowledge Graphs -- 2.1 Adversary Background Knowledge -- 2.2 Anonymity of Knowledge Graphs -- 3 Information Loss Metrics -- 3.1 Attribute and Degree Information Loss -- 3.2 The Attribute Truthfulness Information Loss -- 4 Cluster-Based Knowledge Graph Anonymization -- 4.1 Users' Points Generation -- 4.2 Clusters Generation -- 4.3 Knowledge Graph Generalization -- 5 Experiments -- 5.1 Data Sets. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Copyright Date:
- 2020
- Extent:
- 1 online resource (xix, 478 pages), illustrations
- Subjects:
- 005.8/24
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Electronic books - Languages:
- English
- ISBNs:
- 9783030578787
- Related ISBNs:
- 303057878X
3030578771
9783030578770 - Notes:
- Note: Includes bibliographical references and author index.
Note: Online resource; title from PDF title page (SpringerLink, viewed on Ocotber 6, 2020). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.550203
- Ingest File:
- 03_168.xml