Free shipping on orders over $99
Information Security and Cryptology

Information Security and Cryptology

10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers

by Jianying ZhouMoti Yung and Dongdai Lin
Paperback
Publication Date: 08/04/2015

Share This Book:

  $111.38
or 4 easy payments of $27.84 with
afterpay
This item qualifies your order for FREE DELIVERY
An Efficient Privacy-Preserving E-coupon System.- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications.- Security of Direct Anonymous Authentication Using TPM 2.0 Signature.- Revocation in Publicly Verifiable Outsourced Computation.- Private Aggregation with Custom Collusion Tolerance.- Ring Signatures of Constant Size Without Random Oracles.- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC.- Optimal Proximity Proofs.- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions.- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.- Fully Homomorphic Encryption with Auxiliary Inputs.- Trapdoors for Ideal Lattices with Applications.- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.- The Boomerang Attacks on BLAKE and BLAKE2.- Second Preimage Analysis of Whirlwind.- Boomerang Attack on Step-Reduced SHA-512.- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique.- Rig: A Simple, Secure and Flexible Design for Password Hashing.- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption.- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks.- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication.- A Note on Diem's Proof.- Stand-by Attacks on E-ID Password Authentication.- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.- A Lightweight Security Isolation Approach for Virtual Machines Deployment.- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors.
ISBN:
9783319167442
9783319167442
Category:
Algorithms & data structures
Format:
Paperback
Publication Date:
08-04-2015
Language:
English
Publisher:
Springer
Country of origin:
United States
Dimensions (mm):
235x155mm
Weight:
8.42kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro  2 working days

NSW Metro  2 working days

NSW Rural  2 - 3 working days

NSW Remote  2 - 5 working days

NT Metro  3 - 6 working days

NT Remote  4 - 10 working days

QLD Metro  2 - 4 working days

QLD Rural  2 - 5 working days

QLD Remote  2 - 7 working days

SA Metro  2 - 5 working days

SA Rural  3 - 6 working days

SA Remote  3 - 7 working days

TAS Metro  3 - 6 working days

TAS Rural  3 - 6 working days

VIC Metro  2 - 3 working days

VIC Rural  2 - 4 working days

VIC Remote  2 - 5 working days

WA Metro  3 - 6 working days

WA Rural  4 - 8 working days

WA Remote  4 - 12 working days

Reviews

Be the first to review Information Security and Cryptology.