Information security and cryptology : 13th international conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, revised selected papers / Xiaofeng Chen, Dongdai Lin, Moti Yung, (eds). - 1 online resource (XXI, 530 pages) : 84 illustrations - Lecture Notes in Computer Science, 10726 0302-9743 ; LNCS sublibrary. SL 4, Security and cryptology Serienbezeichnung . - Lecture notes in computer science ; 10726. LNCS sublibrary. SL 4, Security and cryptology. .

Includes bibliographical references at chapter ends, and author index.

Keynote speeches ; Security and privacy in the IoT / On crossroads of privacy protection / The dual role of smartphones in IoT security / Cryptographic protocols and algorithms ; Implementing indistinguishability obfuscation using GGH15 / From attack on Feige-Shamir to construction of oblivious transfer / A new lattice sieving algorithm base on angular locality-sensitive hashing / A simpler Bitcoin voting protocol / Post-quantum secure remote password protocol from RLWE problem / Hashing into twisted Jacobi intersection curves / Digital signatures ; Identity-based key-insulated aggregate signatures, revisited / A new constant-size accountable ring signature scheme without random oracles / A universal designated multi-verifier transitive signature scheme / Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme / Encryption ; Parallel long messages encryption scheme based on certificateless cryptosystem for big data / Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes) / Fully homomorphic encryption scheme based on public key compression and batch processing / Leveled FHE with matrix message space / Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext / Elisa Bertino -- Mirosław Kutyłowski -- Kui Ren -- Zheng Zhang, Fangguo Zhang, and Huang Zhang -- Jingyue Yu, Yi Deng, and Yu Chen -- Ping Wang and Dongdong Shang -- Haibo Tian, Liqing Fu, and Jiejie He -- Xinwei Gao, Jintai Ding, Jiqiang Liu, and Lin Li -- Xiaoyang He, Wei Yu, and Kunpeng Wang -- Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide -- Sudhakar Kumawat and Souradyuti Paul -- Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, and Ru Meng -- Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, and Dengguo Feng -- Xuguang Wu, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu -- Geng Wang, Xiao Zhang, and Yanmei Li -- Liquan Chen, Ming Lim, and Muyang Wang -- Biao Wang, Xueqing Wang, and Rui Xue -- Hanwen Feng, Jianwei Liu, Qianhong Wu, and Weiran Liu. Cryptanalysis and attack ; NativeSpeaker : identifying crypto misuses in Android native code libraries / A game-based framework towards cyber-attacks on state estimation in ICSs / Cryptanalysis of Acorn in nonce-reuse setting / An improved method to unveil malware's hidden behavior / BotTokenizer : exploring network tokens of HTTP-based botnet using malicious network traces / Improved cryptanalysis of an ISO standard lightweight block cipher with refined MILP modelling / Meet in the middle attack on type-1 Feistel construction / Applications ; Influence of error on Hamming weights for ASCA / State-of-the-art : security competition in talent education / A modified fuzzy fingerprint vault based on pair-polar minutiae structures / NOR : towards non-intrusive, real-time and OS-agnostic introspection for virtual machines in cloud environment / A method to enlarge the design distance of BCH codes and some classes of infinite optimal cyclic codes / Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, and Dawu Gu -- Cong Chen, Dongdai Lin, Wei Zhang, and Xiaojun Zhou -- Xiaojuan Zhang and Dongdai Lin -- Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, and Zeming Yang -- Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, and Jianguo Jiang -- Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, and Fushan Wei -- Yuanhao Deng, Chenhui Jin, and Rongjia Li -- Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, and Waldemar Cruz -- Xiu Zhang, Baoxu Liu, Xiaorui Gong, and Zhenyu Song -- Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, and Siyun Yan -- Chonghua Wang, Zhiyu Hao, and Xiaochun Yun -- Shanding Xu, Xiwang Cao, and Chunming Tang.

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.

9783319751603 3319751603

10.1007/978-3-319-75160-3 doi

com.springer.onix.9783319751603 Springer Nature

GBB8N8885 bnb

019169461 Uk


Computer security--Congresses.
Data encryption (Computer science)--Congresses.
Computers--Security--General.
Computers--Information Theory.
Computers--Social Aspects--General.
Law--Science & Technology.
Computers--Database Management--Data Mining.
Coding theory & cryptology.
Ethical & social aspects of IT.
Legal aspects of IT.
Data mining.
Computer security.
Data mining.
Computers and civilization.
Computers.
Computer science.
Computer security.
Data encryption (Computer science)
Coding theory.


Electronic books.
Conference papers and proceedings.

QA76.9.A25

005.8

Powered by Koha