Information security and cryptology : 13th international conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, revised selected papers / Xiaofeng Chen, Dongdai Lin, Moti Yung, (eds).

By: (13th : Inscrypt (Conference) (13th : 2017 : Xi'an, China)
Contributor(s): Chen, Xiaofeng [editor.] | Lin, Dongdai [editor.] | Yung, Moti [editor.]
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 10726.; LNCS sublibrary: Publisher: Cham, Switzerland : Springer, 2018Description: 1 online resource (XXI, 530 pages) : 84 illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783319751603; 3319751603Subject(s): Computer security -- Congresses | Data encryption (Computer science) -- Congresses | Computers -- Security -- General | Computers -- Information Theory | Computers -- Social Aspects -- General | Law -- Science & Technology | Computers -- Database Management -- Data Mining | Coding theory & cryptology | Ethical & social aspects of IT | Legal aspects of IT | Data mining | Computer security | Data mining | Computers and civilization | Computers | Computer science | Computer security | Data encryption (Computer science) | Coding theoryGenre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Keynote speeches ; Security and privacy in the IoT / Elisa Bertino -- On crossroads of privacy protection / Mirosław Kutyłowski -- The dual role of smartphones in IoT security / Kui Ren -- Cryptographic protocols and algorithms ; Implementing indistinguishability obfuscation using GGH15 / Zheng Zhang, Fangguo Zhang, and Huang Zhang -- From attack on Feige-Shamir to construction of oblivious transfer / Jingyue Yu, Yi Deng, and Yu Chen -- A new lattice sieving algorithm base on angular locality-sensitive hashing / Ping Wang and Dongdong Shang -- A simpler Bitcoin voting protocol / Haibo Tian, Liqing Fu, and Jiejie He -- Post-quantum secure remote password protocol from RLWE problem / Xinwei Gao, Jintai Ding, Jiqiang Liu, and Lin Li -- Hashing into twisted Jacobi intersection curves / Xiaoyang He, Wei Yu, and Kunpeng Wang -- Digital signatures ; Identity-based key-insulated aggregate signatures, revisited / Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide -- A new constant-size accountable ring signature scheme without random oracles / Sudhakar Kumawat and Souradyuti Paul -- A universal designated multi-verifier transitive signature scheme / Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, and Ru Meng -- Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme / Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, and Dengguo Feng -- Encryption ; Parallel long messages encryption scheme based on certificateless cryptosystem for big data / Xuguang Wu, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu -- Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes) / Geng Wang, Xiao Zhang, and Yanmei Li -- Fully homomorphic encryption scheme based on public key compression and batch processing / Liquan Chen, Ming Lim, and Muyang Wang -- Leveled FHE with matrix message space / Biao Wang, Xueqing Wang, and Rui Xue -- Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext / Hanwen Feng, Jianwei Liu, Qianhong Wu, and Weiran Liu.
Cryptanalysis and attack ; NativeSpeaker : identifying crypto misuses in Android native code libraries / Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, and Dawu Gu -- A game-based framework towards cyber-attacks on state estimation in ICSs / Cong Chen, Dongdai Lin, Wei Zhang, and Xiaojun Zhou -- Cryptanalysis of Acorn in nonce-reuse setting / Xiaojuan Zhang and Dongdai Lin -- An improved method to unveil malware's hidden behavior / Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, and Zeming Yang -- BotTokenizer : exploring network tokens of HTTP-based botnet using malicious network traces / Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, and Jianguo Jiang -- Improved cryptanalysis of an ISO standard lightweight block cipher with refined MILP modelling / Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, and Fushan Wei -- Meet in the middle attack on type-1 Feistel construction / Yuanhao Deng, Chenhui Jin, and Rongjia Li -- Applications ; Influence of error on Hamming weights for ASCA / Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, and Waldemar Cruz -- State-of-the-art : security competition in talent education / Xiu Zhang, Baoxu Liu, Xiaorui Gong, and Zhenyu Song -- A modified fuzzy fingerprint vault based on pair-polar minutiae structures / Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, and Siyun Yan -- NOR : towards non-intrusive, real-time and OS-agnostic introspection for virtual machines in cloud environment / Chonghua Wang, Zhiyu Hao, and Xiaochun Yun -- A method to enlarge the design distance of BCH codes and some classes of infinite optimal cyclic codes / Shanding Xu, Xiwang Cao, and Chunming Tang.
Summary: This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references at chapter ends, and author index.

Keynote speeches ; Security and privacy in the IoT / Elisa Bertino -- On crossroads of privacy protection / Mirosław Kutyłowski -- The dual role of smartphones in IoT security / Kui Ren -- Cryptographic protocols and algorithms ; Implementing indistinguishability obfuscation using GGH15 / Zheng Zhang, Fangguo Zhang, and Huang Zhang -- From attack on Feige-Shamir to construction of oblivious transfer / Jingyue Yu, Yi Deng, and Yu Chen -- A new lattice sieving algorithm base on angular locality-sensitive hashing / Ping Wang and Dongdong Shang -- A simpler Bitcoin voting protocol / Haibo Tian, Liqing Fu, and Jiejie He -- Post-quantum secure remote password protocol from RLWE problem / Xinwei Gao, Jintai Ding, Jiqiang Liu, and Lin Li -- Hashing into twisted Jacobi intersection curves / Xiaoyang He, Wei Yu, and Kunpeng Wang -- Digital signatures ; Identity-based key-insulated aggregate signatures, revisited / Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide -- A new constant-size accountable ring signature scheme without random oracles / Sudhakar Kumawat and Souradyuti Paul -- A universal designated multi-verifier transitive signature scheme / Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, and Ru Meng -- Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme / Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, and Dengguo Feng -- Encryption ; Parallel long messages encryption scheme based on certificateless cryptosystem for big data / Xuguang Wu, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu -- Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes) / Geng Wang, Xiao Zhang, and Yanmei Li -- Fully homomorphic encryption scheme based on public key compression and batch processing / Liquan Chen, Ming Lim, and Muyang Wang -- Leveled FHE with matrix message space / Biao Wang, Xueqing Wang, and Rui Xue -- Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext / Hanwen Feng, Jianwei Liu, Qianhong Wu, and Weiran Liu.

Cryptanalysis and attack ; NativeSpeaker : identifying crypto misuses in Android native code libraries / Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, and Dawu Gu -- A game-based framework towards cyber-attacks on state estimation in ICSs / Cong Chen, Dongdai Lin, Wei Zhang, and Xiaojun Zhou -- Cryptanalysis of Acorn in nonce-reuse setting / Xiaojuan Zhang and Dongdai Lin -- An improved method to unveil malware's hidden behavior / Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, and Zeming Yang -- BotTokenizer : exploring network tokens of HTTP-based botnet using malicious network traces / Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, and Jianguo Jiang -- Improved cryptanalysis of an ISO standard lightweight block cipher with refined MILP modelling / Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, and Fushan Wei -- Meet in the middle attack on type-1 Feistel construction / Yuanhao Deng, Chenhui Jin, and Rongjia Li -- Applications ; Influence of error on Hamming weights for ASCA / Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, and Waldemar Cruz -- State-of-the-art : security competition in talent education / Xiu Zhang, Baoxu Liu, Xiaorui Gong, and Zhenyu Song -- A modified fuzzy fingerprint vault based on pair-polar minutiae structures / Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, and Siyun Yan -- NOR : towards non-intrusive, real-time and OS-agnostic introspection for virtual machines in cloud environment / Chonghua Wang, Zhiyu Hao, and Xiaochun Yun -- A method to enlarge the design distance of BCH codes and some classes of infinite optimal cyclic codes / Shanding Xu, Xiwang Cao, and Chunming Tang.

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.

There are no comments for this item.

to post a comment.

Powered by Koha