Autor Kikuchi, Hiroaki
|
|
Documentos disponibles escritos por este autor (2)
Hacer una sugerencia Refinar búsqueda
Título : Applied Cryptography and Network Security : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings Tipo de documento: documento electrónico Autores: Gollmann, Dieter, ; Miyaji, Atsuko, ; Kikuchi, Hiroaki, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2017 Número de páginas: XVI, 710 p. 167 ilustraciones ISBN/ISSN/DL: 978-3-319-61204-1 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Criptografía Cifrado de datos (Informática) Red de computadoras Ingeniería de software Software de la aplicacion Seguridad de datos e información Criptología Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 15.ª Conferencia Internacional sobre Criptología Aplicada y Seguridad de Redes, ACNS 2017, celebrada en Kanazawa, Japón, en julio de 2017. Los 34 artículos presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 149 presentaciones. Los temas se centran en investigaciones innovadoras y desarrollos actuales que avanzan en las áreas de criptografía aplicada, análisis de seguridad, ciberseguridad y privacidad, seguridad de datos y servidores. Nota de contenido: Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography -- Simple Security Definitions for and Constructions of 0-RTT Key Exchange -- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF -- Secure and Efficient Pairing at 256-bit Security Level -- Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices -- Are You Lying: Validating the Time-Location of Outdoor Images -- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks -- A Pilot Study of Multiple Password Interference between Text and Map-based Passwords -- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security -- A Novel GPU-Based Implementation of the Cube Attack – Preliminary Results Against Trivium -- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY -- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables -- An experimental study of the BDD approach for the search LWE problem -- Efficiently Obfuscating Re-Encryption Program under DDH Assumption -- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease -- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers -- Side-Channel Attacks meet Secure Network Protocols -- Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes -- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs -- Bounds in Various Generalized Settings of the Discrete Logarithm Problem -- An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis -- Accountable Storage -- Maliciously Secure Multi-Client ORAM -- Legacy-Compliant Data Authentication for Industrial Control System Traffic -- Multi-Client Oblivious RAM Secure Against Malicious Servers -- Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols -- Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) -- How to Achieve Bounded Key Dependent Message Security -- Signature Schemes with Randomized Verification -- SCRAPE: Scalable Randomness Attested by Public Entities -- cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation -- Almost Optimal Oblivious Transfer from QA-NIZK -- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Applied Cryptography and Network Security : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings [documento electrónico] / Gollmann, Dieter, ; Miyaji, Atsuko, ; Kikuchi, Hiroaki, . - 1 ed. . - [s.l.] : Springer, 2017 . - XVI, 710 p. 167 ilustraciones.
ISBN : 978-3-319-61204-1
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Criptografía Cifrado de datos (Informática) Red de computadoras Ingeniería de software Software de la aplicacion Seguridad de datos e información Criptología Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 15.ª Conferencia Internacional sobre Criptología Aplicada y Seguridad de Redes, ACNS 2017, celebrada en Kanazawa, Japón, en julio de 2017. Los 34 artículos presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 149 presentaciones. Los temas se centran en investigaciones innovadoras y desarrollos actuales que avanzan en las áreas de criptografía aplicada, análisis de seguridad, ciberseguridad y privacidad, seguridad de datos y servidores. Nota de contenido: Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography -- Simple Security Definitions for and Constructions of 0-RTT Key Exchange -- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF -- Secure and Efficient Pairing at 256-bit Security Level -- Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices -- Are You Lying: Validating the Time-Location of Outdoor Images -- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks -- A Pilot Study of Multiple Password Interference between Text and Map-based Passwords -- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security -- A Novel GPU-Based Implementation of the Cube Attack – Preliminary Results Against Trivium -- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY -- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables -- An experimental study of the BDD approach for the search LWE problem -- Efficiently Obfuscating Re-Encryption Program under DDH Assumption -- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease -- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers -- Side-Channel Attacks meet Secure Network Protocols -- Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes -- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs -- Bounds in Various Generalized Settings of the Discrete Logarithm Problem -- An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis -- Accountable Storage -- Maliciously Secure Multi-Client ORAM -- Legacy-Compliant Data Authentication for Industrial Control System Traffic -- Multi-Client Oblivious RAM Secure Against Malicious Servers -- Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols -- Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) -- How to Achieve Bounded Key Dependent Message Security -- Signature Schemes with Randomized Verification -- SCRAPE: Scalable Randomness Attested by Public Entities -- cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation -- Almost Optimal Oblivious Transfer from QA-NIZK -- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i
Título : Information Security Practice and Experience : 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings Tipo de documento: documento electrónico Autores: Su, Chunhua, ; Kikuchi, Hiroaki, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2018 Número de páginas: XIV, 624 p. 111 ilustraciones ISBN/ISSN/DL: 978-3-319-99807-7 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Criptología Inteligencia artificial Redes de comunicación informática Seguridad de datos e información Red informática Cifrado de datos (Informática) Criptografía Protección de datos Ordenador Entornos informáticos Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de la 14.ª Conferencia Internacional sobre Prácticas y Experiencias en Seguridad de la Información, ISPEC 2018, celebrada en Tokio, Japón, en septiembre de 2018. Los 39 artículos presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 73 presentaciones. Estaban organizados en secciones temáticas denominadas: seguridad del sistema; criptografía de clave pública; cifrado funcional y con capacidad de búsqueda; esquemas de firma poscuánticos; protocolos de seguridad; Seguridad de la red; autenticación; ataques de canal lateral; seguridad para sistemas ciberfísicos; seguridad en entorno móvil; computación segura y privacidad de datos; y protocolos criptográficos. . Nota de contenido: System Security -- Macros Finder: Do You Remember LOVELETTER -- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection -- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification -- Compact Ring Signature in the Standard Model for Blockchain -- Public key cryptography -- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE -- An Almost Non-Interactive Order Preserving Encryption Scheme -- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding -- Searchable and functional encryption -- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits -- Constrained (Verifiable) Pseudorandom Function from Functional Encryption -- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper) -- (Post-quantum) Signature schemes -- Certificateless Public Key Signature Schemes from Standard Algorithms -- A New Design of Online/Offline Signatures Based on Lattice -- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case -- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation -- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures -- Security Protocols -- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes -- Keyword-Based Delegable Proofs of Storage -- A Generic Framework for Accountable Optimistic Fair Exchange Protocol -- Network Security -- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification -- A Two-Stage Classifier Approach for Network Intrusion Detection -- DSH: Deniable Secret Handshake Framework -- Authentication -- Non-adaptive Group-Testing Aggregate MAC Scheme -- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones -- Seeing is believing: authenticating users with what they see and remember -- Side-channel Attacks -- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks -- Recovering Memory Access Sequence with Differential Flush+Reload Attack -- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE -- Security for Cyber-Physical Systems -- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper) -- Regulating IoT messages -- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks -- Security in Mobile Environment -- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare -- Privacy-preserving data collection for mobile phone sensing tasks -- Secure Computation and Data Privacy -- M-ORAM Revisited: Security and Construction Updates -- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM -- (k,l)-clustering for Transactional Data Streams Anonymization -- Cryptographic Protocols -- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion -- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness -- An Efficient and Provably Secure Private Polynomial Evaluation Scheme -- Efficient Traceable Oblivious Transfer and Its Applications. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Information Security Practice and Experience : 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings [documento electrónico] / Su, Chunhua, ; Kikuchi, Hiroaki, . - 1 ed. . - [s.l.] : Springer, 2018 . - XIV, 624 p. 111 ilustraciones.
ISBN : 978-3-319-99807-7
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Criptología Inteligencia artificial Redes de comunicación informática Seguridad de datos e información Red informática Cifrado de datos (Informática) Criptografía Protección de datos Ordenador Entornos informáticos Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de la 14.ª Conferencia Internacional sobre Prácticas y Experiencias en Seguridad de la Información, ISPEC 2018, celebrada en Tokio, Japón, en septiembre de 2018. Los 39 artículos presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 73 presentaciones. Estaban organizados en secciones temáticas denominadas: seguridad del sistema; criptografía de clave pública; cifrado funcional y con capacidad de búsqueda; esquemas de firma poscuánticos; protocolos de seguridad; Seguridad de la red; autenticación; ataques de canal lateral; seguridad para sistemas ciberfísicos; seguridad en entorno móvil; computación segura y privacidad de datos; y protocolos criptográficos. . Nota de contenido: System Security -- Macros Finder: Do You Remember LOVELETTER -- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection -- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification -- Compact Ring Signature in the Standard Model for Blockchain -- Public key cryptography -- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE -- An Almost Non-Interactive Order Preserving Encryption Scheme -- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding -- Searchable and functional encryption -- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits -- Constrained (Verifiable) Pseudorandom Function from Functional Encryption -- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper) -- (Post-quantum) Signature schemes -- Certificateless Public Key Signature Schemes from Standard Algorithms -- A New Design of Online/Offline Signatures Based on Lattice -- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case -- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation -- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures -- Security Protocols -- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes -- Keyword-Based Delegable Proofs of Storage -- A Generic Framework for Accountable Optimistic Fair Exchange Protocol -- Network Security -- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification -- A Two-Stage Classifier Approach for Network Intrusion Detection -- DSH: Deniable Secret Handshake Framework -- Authentication -- Non-adaptive Group-Testing Aggregate MAC Scheme -- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones -- Seeing is believing: authenticating users with what they see and remember -- Side-channel Attacks -- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks -- Recovering Memory Access Sequence with Differential Flush+Reload Attack -- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE -- Security for Cyber-Physical Systems -- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper) -- Regulating IoT messages -- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks -- Security in Mobile Environment -- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare -- Privacy-preserving data collection for mobile phone sensing tasks -- Secure Computation and Data Privacy -- M-ORAM Revisited: Security and Construction Updates -- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM -- (k,l)-clustering for Transactional Data Streams Anonymization -- Cryptographic Protocols -- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion -- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness -- An Efficient and Provably Secure Private Polynomial Evaluation Scheme -- Efficient Traceable Oblivious Transfer and Its Applications. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i

