Information Security
15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings
Herausgegeben:Gollmann, Dieter; Freiling, Felix C.
Information Security
15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings
Herausgegeben:Gollmann, Dieter; Freiling, Felix C.
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
- Cryptographic Hardware and Embedded Systems -- CHES 201237,99 €
- Distributed Computing and Networking37,99 €
- Advances in Information and Computer Security37,99 €
- Progress in Cryptology - AFRICACRYPT 201041,99 €
- Security and Privacy74,99 €
- Innovative Security Solutions for Information Technology and Communications37,99 €
- Security and Privacy74,99 €
-
-
-
The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
- Produktdetails
- Lecture Notes in Computer Science 7483
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-33382-8
- 2012
- Seitenzahl: 416
- Erscheinungstermin: 17. August 2012
- Englisch
- Abmessung: 235mm x 155mm x 23mm
- Gewicht: 628g
- ISBN-13: 9783642333828
- ISBN-10: 3642333826
- Artikelnr.: 36257678
- Lecture Notes in Computer Science 7483
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-33382-8
- 2012
- Seitenzahl: 416
- Erscheinungstermin: 17. August 2012
- Englisch
- Abmessung: 235mm x 155mm x 23mm
- Gewicht: 628g
- ISBN-13: 9783642333828
- ISBN-10: 3642333826
- Artikelnr.: 36257678
Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks.- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust NegotiationSystems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data.
Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks.- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust NegotiationSystems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data.