The Resource Cryptology and network security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, edited by Michael Reiter, David Naccache

Cryptology and network security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, edited by Michael Reiter, David Naccache

Label
Cryptology and network security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
Title
Cryptology and network security
Title remainder
14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
Statement of responsibility
edited by Michael Reiter, David Naccache
Title variation
CANS 2015
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs
Member of
Cataloging source
NUI
Dewey number
005.82
Illustrations
illustrations
Image bit depth
0
Index
no index present
Language note
English
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2015
http://bibfra.me/vocab/lite/meetingName
International Conference on Cryptology and Network Security
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
1967-
http://library.link/vocab/relatedWorkOrContributorName
  • Reiter, Michael
  • Naccache, David
Series statement
Lecture Notes in Computer Science,
Series volume
9476
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Computer science
  • Computer networks
  • Computer security
  • Data encryption (Computer science)
  • Management information systems
  • Computer networks
  • Computer science
  • Computer security
  • Data encryption (Computer science)
  • Management information systems
  • Computer Science
  • Engineering & Applied Sciences
  • Computer Science
  • Data Encryption
  • Systems and Data Security
  • Management of Computing and Information Systems
  • Computer Communication Networks
  • Computers
  • Business & Economics
  • Computers
  • Computer security
  • Information architecture
  • Network hardware
  • Coding theory & cryptology
Label
Cryptology and network security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, edited by Michael Reiter, David Naccache
Link
https://ezproxy.lib.ou.edu/login?url=http://link.springer.com/10.1007/978-3-319-26823-1
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Organization; Contents; Internet of Things and Privacy; PUDA -- Privacy and Unforgeability for Data Aggregation; 1 Introduction; 2 Problem Statement; 2.1 PUDA Model; 2.2 Security Model; 3 Idea of our PUDA Protocol; 4 PUDA Instantiation; 4.1 Shi-Chan-Rieffel-Chow-Song Scheme; 4.2 PUDA Scheme; 5 Analysis; 5.1 Aggregator Obliviousness; 5.2 Aggregate Unforgeability; 5.3 Performance Evaluation; 6 Related Work; 7 Concluding Remarks; A Security Evidence for the LEOM Assumption; B Aggregate Unforgeability; References; A Security Framework for Internet of Things; 1 Introduction
  • 2 Related Work3 Background; 3.1 Organization-Based Access Control Model (OrBAC); 3.2 Main Architectures for IoT Access Control; 4 SmartOrBAC; 4.1 SmartOrBAC Abstraction Layers; 4.2 Enhancing OrBAC for Context Awareness; 4.3 Scenario; 5 Implementation; 6 Conclusion; References; Privacy-Aware Authentication in the Internet of Things; 1 Introduction; 2 Internet Security Protocols; 3 RFID Privacy Models; 4 IPsec-Conform Authentication; 4.1 IPsec Conformance of Existing Protocols; 4.2 Possible Realizations; 4.3 IPsec-Conform Privacy-Aware Authentication; 5 Conclusion; References
  • Password-Based AuthenticationSecurity of Linear Secret-Sharing Schemes Against Mass Surveillance; 1 Introduction; 2 Preliminaries; 2.1 Secret Sharing; 2.2 Linear Secret Sharing; 3 Subverting Secret-Sharing; 3.1 Definitions; 3.2 Share-Fixing; 3.3 Shares Replacement Attack; 4 Subversion Resilient Secret Sharing; 4.1 Multi-input Secret Sharing; 4.2 Definitions; 4.3 Subversion Resilient Multi-input LSSS; References; Secure Set-Based Policy Checking and Its Application to Password Registration; 1 Introduction; 2 Related Work; 3 Preliminaries; 3.1 Policies and Linear Secret Sharing
  • 3.2 Oblivious Bloom Intersection4 Secure Set-Based Policy Checking (SPC); 4.1 SPC Instantiation; 4.2 Security; 5 A New Password Registration Protocol; 5.1 Passwords and Password Policies; 5.2 The Password Registration Protocol; 5.3 Security Analysis; 5.4 Password-Authenticated Key Exchange for Our Protocol; 6 Implementation and Evaluation; 7 SPC Applications; 8 Conclusion and Future Work; References; SEPM: Efficient Partial Keyword Search on Encrypted Data; 1 Introduction; 1.1 Background; 1.2 Key Techniques; 1.3 Our Contributions; 2 Preliminaries; 2.1 Notations
  • 2.2 Dual Pairing Vector Spaces (DPVS)2.3 Decisional Linear (DLIN) Assumption; 3 Inner-Product Encryption with Trapdoor Conversion; 3.1 Syntax of IPE-TC; 3.2 Security Definition; 4 Proposed IPE-TC Scheme; 5 Overview of SEPM Using IPE-TC; A Preliminaries Lemmas; References; Attacks and Malicious Code; Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals; 1 Introduction; 2 Background; 2.1 System Model; 2.2 Threat Model and Attack Phases; 3 Attack Overview and Scenarios; 3.1 Automated Attacks; 3.2 Human Attacks; 4 Attack Design and Implementation
Dimensions
unknown
Extent
1 online resource (x, 257 pages)
File format
multiple file formats
Form of item
online
Isbn
9783319268231
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
SpringerLink
Other control number
10.1007/978-3-319-26823-1
Other physical details
illustrations.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)932170404
  • (OCoLC)ocn932170404
Label
Cryptology and network security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, edited by Michael Reiter, David Naccache
Link
https://ezproxy.lib.ou.edu/login?url=http://link.springer.com/10.1007/978-3-319-26823-1
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Organization; Contents; Internet of Things and Privacy; PUDA -- Privacy and Unforgeability for Data Aggregation; 1 Introduction; 2 Problem Statement; 2.1 PUDA Model; 2.2 Security Model; 3 Idea of our PUDA Protocol; 4 PUDA Instantiation; 4.1 Shi-Chan-Rieffel-Chow-Song Scheme; 4.2 PUDA Scheme; 5 Analysis; 5.1 Aggregator Obliviousness; 5.2 Aggregate Unforgeability; 5.3 Performance Evaluation; 6 Related Work; 7 Concluding Remarks; A Security Evidence for the LEOM Assumption; B Aggregate Unforgeability; References; A Security Framework for Internet of Things; 1 Introduction
  • 2 Related Work3 Background; 3.1 Organization-Based Access Control Model (OrBAC); 3.2 Main Architectures for IoT Access Control; 4 SmartOrBAC; 4.1 SmartOrBAC Abstraction Layers; 4.2 Enhancing OrBAC for Context Awareness; 4.3 Scenario; 5 Implementation; 6 Conclusion; References; Privacy-Aware Authentication in the Internet of Things; 1 Introduction; 2 Internet Security Protocols; 3 RFID Privacy Models; 4 IPsec-Conform Authentication; 4.1 IPsec Conformance of Existing Protocols; 4.2 Possible Realizations; 4.3 IPsec-Conform Privacy-Aware Authentication; 5 Conclusion; References
  • Password-Based AuthenticationSecurity of Linear Secret-Sharing Schemes Against Mass Surveillance; 1 Introduction; 2 Preliminaries; 2.1 Secret Sharing; 2.2 Linear Secret Sharing; 3 Subverting Secret-Sharing; 3.1 Definitions; 3.2 Share-Fixing; 3.3 Shares Replacement Attack; 4 Subversion Resilient Secret Sharing; 4.1 Multi-input Secret Sharing; 4.2 Definitions; 4.3 Subversion Resilient Multi-input LSSS; References; Secure Set-Based Policy Checking and Its Application to Password Registration; 1 Introduction; 2 Related Work; 3 Preliminaries; 3.1 Policies and Linear Secret Sharing
  • 3.2 Oblivious Bloom Intersection4 Secure Set-Based Policy Checking (SPC); 4.1 SPC Instantiation; 4.2 Security; 5 A New Password Registration Protocol; 5.1 Passwords and Password Policies; 5.2 The Password Registration Protocol; 5.3 Security Analysis; 5.4 Password-Authenticated Key Exchange for Our Protocol; 6 Implementation and Evaluation; 7 SPC Applications; 8 Conclusion and Future Work; References; SEPM: Efficient Partial Keyword Search on Encrypted Data; 1 Introduction; 1.1 Background; 1.2 Key Techniques; 1.3 Our Contributions; 2 Preliminaries; 2.1 Notations
  • 2.2 Dual Pairing Vector Spaces (DPVS)2.3 Decisional Linear (DLIN) Assumption; 3 Inner-Product Encryption with Trapdoor Conversion; 3.1 Syntax of IPE-TC; 3.2 Security Definition; 4 Proposed IPE-TC Scheme; 5 Overview of SEPM Using IPE-TC; A Preliminaries Lemmas; References; Attacks and Malicious Code; Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals; 1 Introduction; 2 Background; 2.1 System Model; 2.2 Threat Model and Attack Phases; 3 Attack Overview and Scenarios; 3.1 Automated Attacks; 3.2 Human Attacks; 4 Attack Design and Implementation
Dimensions
unknown
Extent
1 online resource (x, 257 pages)
File format
multiple file formats
Form of item
online
Isbn
9783319268231
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
SpringerLink
Other control number
10.1007/978-3-319-26823-1
Other physical details
illustrations.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)932170404
  • (OCoLC)ocn932170404

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...