Information security practice and experience : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, proceedings /

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized...

Full description

Saved in:
Bibliographic Details
Corporate Authors: ISPEC (Conference) Lanzhou Shi, China); SpringerLink (Online service)
Group Author: Deng, Robert H.; Feng, Tao
Published: Springer,
Publisher Address: Berlin ; New York :
Publication Dates: [2013]
Literature type: eBook
Language: English
Series: Lecture notes in computer science, 7863
LNCS sublibrary. SL 4, Security and cryptology
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-38033-4
Summary: This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.
Item Description: International conference proceedings.
Carrier Form: 1 online resource (xiii, 388 pages) : illustrations
Bibliography: Includes bibliographical references and author index.
ISBN: 9783642380334 (electronic book)
3642380336 (electronic book)
Index Number: QA76
CLC: TP393.4
Contents: Network Security.
Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection /
Trusted Identity Management for Overlay Networks /
Situational Awareness for Improving Network Resilience Management /
Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model /
Attribute Specified Identity-Based Encryption /
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions /
Identity-Based Multisignature with Message Recovery /
Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme /
Cryptographic Primitives.
Accountable Trapdoor Sanitizable Signatures /
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release /
About Hash into Montgomery Form Elliptic Curves /
Joint Triple-Base Number System for Multi-Scalar Multiplication /
Security Protocols.
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks /
Secure RFID Ownership Transfer Protocols /
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model /
Simplified PACE-AA Protocol /
System Security.
Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control /
Efficient Attack Detection Based on a Compressed Model /
A Digital Forensic Framework for Automated User Activity Reconstruction /
Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware /
Software Security DRM.
VulLocator: Automatically Locating Vulnerable Code in Binary Programs /
Software Protection with Obfuscation and Encryption /
Secure Content Delivery in DRM System with Consumer Privacy /
Cryptanalysis and Side Channel Attacks.
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers /
Cryptanalysis of the OKH Authenticated Encryption Scheme /
Security Evaluation of Rakaposhi Stream Cipher /
Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher /