| Título : |
Information Security Practice and Experience : 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Su, Chunhua, ; Kikuchi, Hiroaki, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2018 |
| Número de páginas: |
XIV, 624 p. 111 ilustraciones |
| ISBN/ISSN/DL: |
978-3-319-99807-7 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Criptología Inteligencia artificial Redes de comunicación informática Seguridad de datos e información Red informática Cifrado de datos (Informática) Criptografía Protección de datos Ordenador Entornos informáticos |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la 14.ª Conferencia Internacional sobre Prácticas y Experiencias en Seguridad de la Información, ISPEC 2018, celebrada en Tokio, Japón, en septiembre de 2018. Los 39 artículos presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 73 presentaciones. Estaban organizados en secciones temáticas denominadas: seguridad del sistema; criptografía de clave pública; cifrado funcional y con capacidad de búsqueda; esquemas de firma poscuánticos; protocolos de seguridad; Seguridad de la red; autenticación; ataques de canal lateral; seguridad para sistemas ciberfísicos; seguridad en entorno móvil; computación segura y privacidad de datos; y protocolos criptográficos. . |
| Nota de contenido: |
System Security -- Macros Finder: Do You Remember LOVELETTER -- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection -- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification -- Compact Ring Signature in the Standard Model for Blockchain -- Public key cryptography -- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE -- An Almost Non-Interactive Order Preserving Encryption Scheme -- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding -- Searchable and functional encryption -- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits -- Constrained (Verifiable) Pseudorandom Function from Functional Encryption -- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper) -- (Post-quantum) Signature schemes -- Certificateless Public Key Signature Schemes from Standard Algorithms -- A New Design of Online/Offline Signatures Based on Lattice -- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case -- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation -- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures -- Security Protocols -- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes -- Keyword-Based Delegable Proofs of Storage -- A Generic Framework for Accountable Optimistic Fair Exchange Protocol -- Network Security -- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification -- A Two-Stage Classifier Approach for Network Intrusion Detection -- DSH: Deniable Secret Handshake Framework -- Authentication -- Non-adaptive Group-Testing Aggregate MAC Scheme -- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones -- Seeing is believing: authenticating users with what they see and remember -- Side-channel Attacks -- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks -- Recovering Memory Access Sequence with Differential Flush+Reload Attack -- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE -- Security for Cyber-Physical Systems -- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper) -- Regulating IoT messages -- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks -- Security in Mobile Environment -- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare -- Privacy-preserving data collection for mobile phone sensing tasks -- Secure Computation and Data Privacy -- M-ORAM Revisited: Security and Construction Updates -- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM -- (k,l)-clustering for Transactional Data Streams Anonymization -- Cryptographic Protocols -- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion -- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness -- An Efficient and Provably Secure Private Polynomial Evaluation Scheme -- Efficient Traceable Oblivious Transfer and Its Applications. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Information Security Practice and Experience : 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings [documento electrónico] / Su, Chunhua, ; Kikuchi, Hiroaki, . - 1 ed. . - [s.l.] : Springer, 2018 . - XIV, 624 p. 111 ilustraciones. ISBN : 978-3-319-99807-7 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Criptología Inteligencia artificial Redes de comunicación informática Seguridad de datos e información Red informática Cifrado de datos (Informática) Criptografía Protección de datos Ordenador Entornos informáticos |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la 14.ª Conferencia Internacional sobre Prácticas y Experiencias en Seguridad de la Información, ISPEC 2018, celebrada en Tokio, Japón, en septiembre de 2018. Los 39 artículos presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 73 presentaciones. Estaban organizados en secciones temáticas denominadas: seguridad del sistema; criptografía de clave pública; cifrado funcional y con capacidad de búsqueda; esquemas de firma poscuánticos; protocolos de seguridad; Seguridad de la red; autenticación; ataques de canal lateral; seguridad para sistemas ciberfísicos; seguridad en entorno móvil; computación segura y privacidad de datos; y protocolos criptográficos. . |
| Nota de contenido: |
System Security -- Macros Finder: Do You Remember LOVELETTER -- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection -- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification -- Compact Ring Signature in the Standard Model for Blockchain -- Public key cryptography -- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE -- An Almost Non-Interactive Order Preserving Encryption Scheme -- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding -- Searchable and functional encryption -- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits -- Constrained (Verifiable) Pseudorandom Function from Functional Encryption -- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper) -- (Post-quantum) Signature schemes -- Certificateless Public Key Signature Schemes from Standard Algorithms -- A New Design of Online/Offline Signatures Based on Lattice -- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case -- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation -- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures -- Security Protocols -- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes -- Keyword-Based Delegable Proofs of Storage -- A Generic Framework for Accountable Optimistic Fair Exchange Protocol -- Network Security -- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification -- A Two-Stage Classifier Approach for Network Intrusion Detection -- DSH: Deniable Secret Handshake Framework -- Authentication -- Non-adaptive Group-Testing Aggregate MAC Scheme -- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones -- Seeing is believing: authenticating users with what they see and remember -- Side-channel Attacks -- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks -- Recovering Memory Access Sequence with Differential Flush+Reload Attack -- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE -- Security for Cyber-Physical Systems -- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper) -- Regulating IoT messages -- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks -- Security in Mobile Environment -- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare -- Privacy-preserving data collection for mobile phone sensing tasks -- Secure Computation and Data Privacy -- M-ORAM Revisited: Security and Construction Updates -- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM -- (k,l)-clustering for Transactional Data Streams Anonymization -- Cryptographic Protocols -- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion -- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness -- An Efficient and Provably Secure Private Polynomial Evaluation Scheme -- Efficient Traceable Oblivious Transfer and Its Applications. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |