Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings / Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.).

"This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully...

Full description

Saved in:
Bibliographic Details
Corporate Author: ACNS (Conference) Guildford, England)
Other Authors: Manulis, Mark (Editor), Sadeghi, Ahmad-Reza (Editor), Schneider, Steve (Editor)
Format: Ebook
Language:English
Published: Cham : Springer, 2016.
Series:Lecture notes in computer science ; 9696.
LNCS sublibrary. Security and cryptology
Subjects:
Online Access:Springer eBooks

MARC

LEADER 00000czm a2200000 i 4500
003 OCoLC
005 20231012155427.0
006 m o d
007 cr cnu000|uu||
008 160617s2016 sz a o 101 0 eng d
011 |a BIB MATCHES WORLDCAT 
011 |a EDS Title: Applied Cryptography and Network Security 
011 |a MARC Score : 10850(23550) : OK 
011 |a Direct Search Result 
011 |a Has 217 WorldCat Holdings 
020 |z 3319395548  |q print 
020 |z 9783319395548  |q print 
020 |a 3319395556  |q Internet 
020 |a 9783319395555  |q Internet 
035 |a (ATU)b19437730 
035 |a (OCoLC)951807257 
035 |a (EDS)EDS11002607 
040 |a GW5XE  |b eng  |e rda  |c GW5XE  |d OCLCO  |d YDXCP  |d AZU  |d OCLCF  |d L2U  |d KSU  |d ATU 
050 4 |a QA76.9.A25 
082 0 4 |a 005.82  |2 23 
111 2 |a ACNS (Conference)  |n (14th :  |d 2016 :  |c Guildford, England)  |9 494059 
245 1 0 |a Applied cryptography and network security :  |b 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /  |c Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.). 
246 3 |a ACNS 2016 
264 1 |a Cham :  |b Springer,  |c 2016. 
300 |a 1 online resource (xiv, 668 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 9696 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
500 |a International conference proceedings. 
500 |a Includes author index. 
505 0 0 |t Authentication and Key Establishment: --  |t On the Security of the Algebraic Eraser Tag Authentication Protocol /  |r Simon R. Blackburn, M. J. B. Robshaw --  |t A Cryptographic Analysis of UMTS/LTE AKA /  |r Stephanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard --  |t Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token /  |r Ian Goldberg, Graeme Jenkinson, Frank Stajano --  |t Two More Efficient Variants of the J-PAKE Protocol /  |r Jean Lancrenon, Marjan Škrobot, Qiang Tang --  |t Hash-Based TPM Signatures for the Quantum World /  |r Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire --  |t Signatures with Advanced Properties: --  |t Fuzzy Signatures: Relaxing Requirements and a New Construction /  |r Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka --  |t Foundations of Fully Dynamic Group Signatures /  |r Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth --  |t A Lattice-Based Group Signature Scheme with Message-Dependent Opening /  |r Benoît Libert, Fabrice Mouhartem, Khoa Nguyen --  |t Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security /  |r Rosario Gennaro, Steven Goldfeder, Arvind Narayanan --  |t Legally Fair Contract Signing Without Keystones /  |r Houda Ferradi, Rémi Géraud, Diana Maimuț, David Naccache, David Pointcheval --  |t DoS Attacks and Network Anomaly Detection: --  |t Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms /  |r Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou --  |t Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering /  |r Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad --  |t Deterministic and Functional Encryption: --  |t More Efficient Constructions for Inner-Product Encryption /  |r Somindu C. Ramanna --  |t Attribute Based Encryption with Direct Efficiency Tradeoff /  |r Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada --  |t Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions /  |r Xavier Boyen, Qinyi Li --  |t Offline Witness Encryption /  |r Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak --  |t Deterministic Public-Key Encryption Under Continual Leakage /  |r Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent  Waters --  |t Computing on Encrypted Data: --  |t Better Preprocessing for Secure Multiparty Computation /  |r Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Zakarias --  |t Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation /  |r Berry Schoenmakers, Meilof Veeningen, Niels de Vreede --  |t Verifiable Multi-party Computation with Perfectly Private Audit Trail /  |r Édouard Cuvelier, Olivier Pereira --  |t Practical Fault-Tolerant Data Aggregation /  |r Krzysztof Grining, Marek Klonowski, Piotr Syga --  |t Accelerating Homomorphic Computations on Rational Numbers /  |r Angela Jäschke, Frederik Armknecht --  |t Non-Interactive Proofs and PRFs: --  |t New Techniques for Non-interactive Shuffle and Range Arguments /  |r Alonso González, Carla Ráfols --  |t Constrained PRFs for Unbounded Inputs with Short Keys /  |r Hamza Abusalah, Georg Fuchsbauer --  |t Symmetric Ciphers: --  |t Wide Trail Design Strategy for Binary MixColumns /  |r Yosuke Todo, Kazumaro Aoki --  |t Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey /  |r Yunwen Liu, Qingju Wang, Vincent Rijmen --  |t Square Attack on 7-Round Kiasu-BC /  |r Christoph Dobraunig, Maria Eichlseder, Florian Mendel --  |t On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants /  |r Kota Kondo, Yu Sasaki, Tetsu Iwata --  |t Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice /  |r Alex Biryukov, Daniel Dinu, Johann Großschädl --  |t Cryptography in Software: --  |t Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing /  |r Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque --  |t Parallel Implementation of BDD Enumeration for LWE /  |r Elena Kirshanova, Alexander May, Friedrich Wiemer --  |t Memory Carving in Embedded Devices: Separate the Wheat from the Chaff /  |r Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger --  |t Security for Human Use: --  |t CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery /  |r Mauro Conti, Claudio Guarisco, Riccardo Spolaor --  |t TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones /  |r Weizhi Meng, Wenjuan Li, Duncan S. Wong, Jianying Zhou --  |t Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case /  |r Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kaafar. 
520 |a "This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. "--Publisher's website. 
538 |a Mode of access: World Wide Web. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed June 17, 2016). 
650 0 |a Data encryption (Computer science)  |v Congresses  |9 557591 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |9 559357 
650 0 |a Cloud computing  |v Congresses  |9 625668 
700 1 |a Manulis, Mark,  |e editor.  |9 310006 
700 1 |a Sadeghi, Ahmad-Reza,  |e editor.  |9 858992 
700 1 |a Schneider, Steve,  |e editor.  |9 1022797 
776 0 8 |i Printed edition:  |z 9783319395548 
830 0 |a Lecture notes in computer science ;  |v 9696.  |x 0302-9743.  |9 291610 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology  |9 252772 
856 4 0 |u https://ezproxy.aut.ac.nz/login?url=https://link.springer.com/10.1007/978-3-319-39555-5  |z Springer eBooks  |x TEMPORARY ERM URL 
907 |a .b19437730  |b 06-09-21  |c 04-11-16 
942 |c EB 
998 |a none  |b 23-06-17  |c m  |d z   |e -  |f eng  |g sz   |h 0 
999 |c 1366838  |d 1366838 
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.