Security engineering and intelligence informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, proceedings /

This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework...

Full description

Saved in:
Bibliographic Details
Corporate Authors: International Cross-Domain Conference and Workshop on Availability, Reliability, and Security Regensburg, Germany); SpringerLink (Online service); MoCrySEn 2013 Regensburg, Germany); SeCIHD 2013 Regensburg, Germany)
Group Author: Cuzzocrea, Alfredo, 1974-
Published: Springer,
Publisher Address: Heidelberg :
Publication Dates: 2013.
Literature type: eBook
Language: English
Series: Lecture Notes in Computer Science, 8128
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-40588-4
Summary: This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.
Item Description: International conference proceedings.
Includes author index.
Carrier Form: 1 online resource (xiv, 466 pages) : illustrations.
ISBN: 9783642405884 (electronic bk.)
3642405886 (electronic bk.)
Index Number: QA76
CLC: TP393.08-532
Contents: Modern Cryptography.
Symmetric-Key Cryptography.
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock /
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions /
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography /
Public-Key Cryptography.
Code-Based Public-Key Encryption Resistant to Key Leakage /
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics /
Koshiba Algorithmic Cryptanalysis.
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images /
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method /
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack /
Security Engineering.
Software and Hardware Implementation of Cryptographic Algorithms.
Code-Based Identification and Signature Schemes in Software /
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine /
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves /
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves /
Database Encryption.
Cumulus4j: A Provably Secure Database Abstraction Layer /
Interaction between Cryptographic Theory and Implementation Issues.
Optimal Parameters for XMSS MT /
Solving the Discrete Logarithm Problem for Packing Candidate Preferences /
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences /
Cyber Security and Dependability.
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace /
Analyzing the Internet Stability in Presence of Disasters /
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project /
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function /
Using Probabilistic Analysis for the Certification of Machine Control Systems /
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms /
Network Security and Privacy.
A Multiple-Key Management Scheme in Wireless Sensor Networks /
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment /
A Denial of Service Attack to GSM Networks via Attach Procedure /
PPM: Privacy Policy Manager for Personalized Services /
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks /
Multimedia Technology for Homeland Defense.
Intelligent UBMSS Systems for Strategic Information Management /
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness /
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense /
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios /
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process /