Advances in Information and Computer Security
Software and System Security.- Secure Log Transfer by Replacing a Library in a Virtual Machine.- Static Integer Overflow Vulnerability Detection in Windows Binary.- Solving Google's Continuous Audio CAPTCHA with HMM-Based Automatic Speech Recognition.- Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces.- Cryptanalysis.- Differential Power Analysis of MAC-Keccak at Any Key-Length.- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC.- New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA.- Improvement of Faug`ere et al.'s Method to Solve ECDLP.- Privacy and Cloud Computing.- Statistics on Encrypted Cloud Data.- Toward Practical Searchable Symmetric Encryption.- Unconditionally Secure Oblivious Transfer from Real Network Behavior.- Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption.- Public Key Cryptosystems.- Efficient Algorithm for Tate Pairing of Composite Order.- How to Factor N1 and N2 When p1 = p2 mod 2t.- Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption.- Cryptanalysis of the Quaternion Rainbow.- Security Protocols.- On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.- One-Round Authenticated Key Exchange without Implementation Trick.- Attacks to the Proxy Re-Encryption Schemes from IWSEC2011.- Game-Theoretic Security for Bit Commitment.
| Erscheint lt. Verlag | 9.10.2013 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XII, 319 p. 53 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 510 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Algorithmen | |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Mathematik / Informatik ► Mathematik | |
| Schlagworte | Algorithm analysis and problem complexity • algorithms • Attacks • ciphers • Distributed Systems • Encryption |
| ISBN-13 | 9783642413827 / 9783642413827 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich