Information Security
17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
Editors:
- Sherman S. M. Chow,
- Jan Camenisch,
- Lucas C. K. Hui,
- Siu Ming Yiu
- … show all 4 hide
Table of contents (36 chapters)
-
Front Matter
Pages -
-
Public-Key Encryption
-
Chapter
Pages 1-18
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
-
Chapter
Pages 19-32
-
-
Authentication
-
Chapter
Pages 33-53
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication
-
Chapter
Pages 54-71
Attribute-Based Signatures for Circuits from Multilinear Maps
-
-
Symmetric Key Cryptography
-
Chapter
Pages 72-89
PAEQ: Parallelizable Permutation-Based Authenticated Encryption
-
Chapter
Pages 90-103
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160
-
Chapter
Pages 104-119
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks
-
-
Zero-Knowledge Proofs and Arguments
-
Chapter
Pages 120-139
Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge
-
Chapter
Pages 140-157
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
-
-
Outsourced and Multi-party Computations
-
Chapter
Pages 158-178
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
-
Chapter
Pages 179-197
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
-
-
Implementation
-
Chapter
Pages 198-215
Exploiting the Floating-Point Computing Power of GPUs for RSA
-
-
Information Leakage
-
Chapter
Pages 216-236
On Formally Bounding Information Leakage by Statistical Estimation
-
Chapter
Pages 237-254
Structure Based Data De-Anonymization of Social Networks and Mobility Traces
-
-
Firewall and Forensics
-
Chapter
Pages 255-272
Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics
-
Chapter
Pages 273-290
SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection
-
-
Web Security
-
Chapter
Pages 291-308
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting
-
Chapter
Pages 309-327
Reducing User Tracking through Automatic Web Site State Isolations
-
-
Android Security
-
Chapter
Pages 328-344
Comprehensive Behavior Profiling for Proactive Android Malware Detection
-
Chapter
Pages 345-363
-
- Book Title
- Information Security
- Book Subtitle
- 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
- Copyright
- 2014
- DOI
- 10.1007/978-3-319-13257-0
- Print ISBN
- 978-3-319-13256-3
- Online ISBN
- 978-3-319-13257-0
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 8783
- Series ISSN
- 0302-9743
- Publisher
- Springer International Publishing
- Copyright Holder
- Springer International Publishing Switzerland
- Additional Links
- Topics
- Industry Sectors
- eBook Packages
- Editors
-
-
Sherman S. M. Chow
(15)
-
Jan Camenisch
(16)
-
Lucas C. K. Hui
(17)
-
Siu Ming Yiu
(17)
-
Sherman S. M. Chow
- Editor Affiliations
-
- 15. Department of Information Engineering, Chinese University of Hong Kong
- 16. IBM Research Zurich
- 17. Department of Computer Science, The University of Hong Kong
Continue reading...
To view the rest of this content please follow the download PDF link above.