Information Security

17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings

ISBN: 978-3-319-13256-3 (Print) 978-3-319-13257-0 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Public-Key Encryption

    1. No Access

      Chapter

      Pages 1-18

      Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups

    2. No Access

      Chapter

      Pages 19-32

      Related-Key Security for Hybrid Encryption

  3. Authentication

    1. No Access

      Chapter

      Pages 33-53

      ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication

    2. No Access

      Chapter

      Pages 54-71

      Attribute-Based Signatures for Circuits from Multilinear Maps

  4. Symmetric Key Cryptography

    1. No Access

      Chapter

      Pages 72-89

      PAEQ: Parallelizable Permutation-Based Authenticated Encryption

    2. No Access

      Chapter

      Pages 90-103

      (Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160

    3. No Access

      Chapter

      Pages 104-119

      Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks

  5. Zero-Knowledge Proofs and Arguments

    1. No Access

      Chapter

      Pages 120-139

      Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge

    2. No Access

      Chapter

      Pages 140-157

      Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols

  6. Outsourced and Multi-party Computations

    1. No Access

      Chapter

      Pages 158-178

      Efficient Secure and Verifiable Outsourcing of Matrix Multiplications

    2. No Access

      Chapter

      Pages 179-197

      Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations

  7. Implementation

    1. No Access

      Chapter

      Pages 198-215

      Exploiting the Floating-Point Computing Power of GPUs for RSA

  8. Information Leakage

    1. No Access

      Chapter

      Pages 216-236

      On Formally Bounding Information Leakage by Statistical Estimation

    2. No Access

      Chapter

      Pages 237-254

      Structure Based Data De-Anonymization of Social Networks and Mobility Traces

  9. Firewall and Forensics

    1. No Access

      Chapter

      Pages 255-272

      Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics

    2. No Access

      Chapter

      Pages 273-290

      SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection

  10. Web Security

    1. No Access

      Chapter

      Pages 291-308

      Soundsquatting: Uncovering the Use of Homophones in Domain Squatting

    2. No Access

      Chapter

      Pages 309-327

      Reducing User Tracking through Automatic Web Site State Isolations

  11. Android Security

    1. No Access

      Chapter

      Pages 328-344

      Comprehensive Behavior Profiling for Proactive Android Malware Detection

    2. No Access

      Chapter

      Pages 345-363

      Analyzing Android Browser Apps for file:// Vulnerabilities

previous Page of 2