Amazon cover image
Image from Amazon.com

Information security : 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings / Javier Lopez, Chris J. Mitchell (eds.).

By: (18th : ISC (Conference : Information security) (18th : 2015 : Trondheim, Norway)Contributor(s): López, Javier [editor.] | Mitchell, Chris J [editor.]Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 9290. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham : Springer, 2015Description: 1 online resource (xiii, 570 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783319233185; 3319233181Other title: ISC 2015Subject(s): Computer security -- Congresses | Data encryption (Computer science) -- Congresses | Coding theory & cryptology | Algorithms & data structures | Maths for computer scientists | Expert systems -- knowledge-based systems | Ethical & social aspects of IT | Computer security | Computers -- Security -- General | Computers -- Programming -- Algorithms | Computers -- Data Processing | Computers -- Expert Systems | Computers -- Social Aspects -- General | Computer security | Data encryption (Computer science) | computerwetenschappen | computer sciences | gegevensbeheer | data management | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Information security.DDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Intro -- Preface -- Organization -- Contents -- Cryptography I: Signatures -- Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model -- 1 Introduction -- 1.1 Our Results -- 2 Preliminaries -- 2.1 Digital Signature Scheme -- 2.2 Canonical Identification Scheme -- 2.3 Fiat-Shamir Transformation -- 3 Impossibility of Proving the Security of FS-Type Signatures in the NPROM -- 4 Security Incompatibility Between the DL Assumption and the EUF-CMA Security of the Schnorr Signature in the NPROM -- References
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures -- 1 Introduction -- 2 Preliminaries -- 2.1 Indistinguishability Obfuscation -- 2.2 Puncturable PRFs -- 2.3 Universal Parameters -- 3 Identity-Based Aggregate Signatures -- 4 Generic Construction of Identity-Based Aggregate Signatures -- 5 Conclusions -- A Appendix -- 1 Public Key Encryption -- 2 Signature Schemes -- 3 Additively Homomorphic Encryption -- References -- Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution
1.3 Paper Organization -- 2 Preliminaries -- 2.1 Entropy and Statistical Distance -- 2.2 Background on Lattices and Hard Problems -- 2.3 Permutation Branching Program. -- 3 Identity-Based Homomorphic Trapdoor Functions -- 3.1 Definition -- 3.2 Construction: Basic Algorithms and Security -- 4 Homomorphic Evaluation and Noise Analysis -- 4.1 Basic Homomorphic Evaluation -- 4.2 The Homomorphic Output and Input Evaluation -- 4.3 Correctness of Homomorphic Evaluation and Noise Analysis -- 5 Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures -- 5.1 Definition -- 5.2 Construction
6 Conclusions -- References -- Graded Signatures -- 1 Introduction -- 2 Definitions and Security Modeling -- 3 Graded Signatures with Linear Signature Size and Verification Time -- A Preliminaries -- References -- System and Software Security -- Dynamically Provisioning Isolation in Hierarchical Architectures -- 1 Introduction -- 2 Background and Related Work -- 3 Isolation and Co-Location -- 3.1 Locality -- 3.2 Confinements -- 4 SafeHaven -- 4.1 Overview -- 4.2 Migrating Confinements -- 4.3 Allocation -- 5 Case Studies -- 5.1 Case 1: System-Wide Covert Channel
5.2 Case 2: Moving Target Defence -- 5.3 Other Policies -- 6 Conclusion -- A Appendix: Migration Frequency and Performance -- References -- Factors Impacting the Effort Required to Fix Security Vulnerabilities -- 1 Introduction -- 2 Related Work -- 3 Secure Software Development at SAP -- 4 Research Approach -- 5 Study Results -- 5.1 Vulnerability-Fixing Process -- 5.2 Factors that Impact the Vulnerability-Fix Time -- 5.3 Discussion -- 6 Impacts and Limitations of the Study -- 6.1 Impacts of the Study -- 6.2 Limitations of the Study -- 7 Lessons Learned -- 8 Conclusions -- References
Summary: This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

International conference proceedings.

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed September 3, 2015).

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.

English.

Intro -- Preface -- Organization -- Contents -- Cryptography I: Signatures -- Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model -- 1 Introduction -- 1.1 Our Results -- 2 Preliminaries -- 2.1 Digital Signature Scheme -- 2.2 Canonical Identification Scheme -- 2.3 Fiat-Shamir Transformation -- 3 Impossibility of Proving the Security of FS-Type Signatures in the NPROM -- 4 Security Incompatibility Between the DL Assumption and the EUF-CMA Security of the Schnorr Signature in the NPROM -- References

The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures -- 1 Introduction -- 2 Preliminaries -- 2.1 Indistinguishability Obfuscation -- 2.2 Puncturable PRFs -- 2.3 Universal Parameters -- 3 Identity-Based Aggregate Signatures -- 4 Generic Construction of Identity-Based Aggregate Signatures -- 5 Conclusions -- A Appendix -- 1 Public Key Encryption -- 2 Signature Schemes -- 3 Additively Homomorphic Encryption -- References -- Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution

1.3 Paper Organization -- 2 Preliminaries -- 2.1 Entropy and Statistical Distance -- 2.2 Background on Lattices and Hard Problems -- 2.3 Permutation Branching Program. -- 3 Identity-Based Homomorphic Trapdoor Functions -- 3.1 Definition -- 3.2 Construction: Basic Algorithms and Security -- 4 Homomorphic Evaluation and Noise Analysis -- 4.1 Basic Homomorphic Evaluation -- 4.2 The Homomorphic Output and Input Evaluation -- 4.3 Correctness of Homomorphic Evaluation and Noise Analysis -- 5 Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures -- 5.1 Definition -- 5.2 Construction

6 Conclusions -- References -- Graded Signatures -- 1 Introduction -- 2 Definitions and Security Modeling -- 3 Graded Signatures with Linear Signature Size and Verification Time -- A Preliminaries -- References -- System and Software Security -- Dynamically Provisioning Isolation in Hierarchical Architectures -- 1 Introduction -- 2 Background and Related Work -- 3 Isolation and Co-Location -- 3.1 Locality -- 3.2 Confinements -- 4 SafeHaven -- 4.1 Overview -- 4.2 Migrating Confinements -- 4.3 Allocation -- 5 Case Studies -- 5.1 Case 1: System-Wide Covert Channel

5.2 Case 2: Moving Target Defence -- 5.3 Other Policies -- 6 Conclusion -- A Appendix: Migration Frequency and Performance -- References -- Factors Impacting the Effort Required to Fix Security Vulnerabilities -- 1 Introduction -- 2 Related Work -- 3 Secure Software Development at SAP -- 4 Research Approach -- 5 Study Results -- 5.1 Vulnerability-Fixing Process -- 5.2 Factors that Impact the Vulnerability-Fix Time -- 5.3 Discussion -- 6 Impacts and Limitations of the Study -- 6.1 Impacts of the Study -- 6.2 Limitations of the Study -- 7 Lessons Learned -- 8 Conclusions -- References

Powered by Koha