Book Volume 7743 2013

Foundations and Practice of Security

5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers

ISBN: 978-3-642-37118-9 (Print) 978-3-642-37119-6 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptography and Information Theory

    1. Chapter

      Pages 1-17

      MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption

    2. Chapter

      Pages 18-32

      Proofs of Retrievability via Fountain Code

    3. Chapter

      Pages 33-44

      MARC: Modified ARC4

    4. Chapter

      Pages 45-61

      Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements

  3. Key Management and Cryptographic Protocols

    1. Chapter

      Pages 62-77

      A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes

    2. Chapter

      Pages 78-94

      Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities

    3. Chapter

      Pages 95-114

      COMPASS: Authenticated Group Key Agreement from Signcryption

  4. Privacy and Trust

    1. Chapter

      Pages 115-131

      Classifying Online Social Network Users through the Social Graph

    2. Chapter

      Pages 132-148

      A Formal Derivation of Composite Trust

    3. Chapter

      Pages 149-161

      IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability

  5. Policies and Applications Security

    1. Chapter

      Pages 162-179

      Policy Administration in Tag-Based Authorization

    2. Chapter

      Pages 180-193

      Enabling Dynamic Security Policy in the Java Security Manager

    3. Chapter

      Pages 194-210

      A Novel Obfuscation: Class Hierarchy Flattening

    4. Chapter

      Pages 211-226

      RESource: A Framework for Online Matching of Assembly with Open Source Code

    5. Chapter

      Pages 227-243

      Touchjacking Attacks on Web in Android, iOS, and Windows Phone

  6. Network and Adaptive Security

    1. Chapter

      Pages 244-260

      Short-Term Linkable Group Signatures with Categorized Batch Verification

    2. Chapter

      Pages 261-277

      GHUMVEE: Efficient, Effective, and Flexible Replication

    3. Chapter

      Pages 278-292

      Extracting Attack Scenarios Using Intrusion Semantics

    4. Chapter

      Pages 293-307

      On Securely Manipulating XML Data

    5. Chapter

      Pages 308-323

      Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks

previous Page of 2