Information Security Practice and Experience

9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings

Editors:

ISBN: 978-3-642-38032-7 (Print) 978-3-642-38033-4 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Network Security

    1. No Access

      Book Chapter

      Pages 1-15

      Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection

    2. No Access

      Book Chapter

      Pages 16-30

      Trusted Identity Management for Overlay Networks

    3. No Access

      Book Chapter

      Pages 31-43

      Situational Awareness for Improving Network Resilience Management

    4. No Access

      Book Chapter

      Pages 44-59

      Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model

  3. Identity-Based Cryptography

    1. No Access

      Book Chapter

      Pages 60-74

      Attribute Specified Identity-Based Encryption

    2. No Access

      Book Chapter

      Pages 75-90

      Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions

    3. No Access

      Book Chapter

      Pages 91-104

      Identity-Based Multisignature with Message Recovery

    4. No Access

      Book Chapter

      Pages 105-116

      Improving the Message-Ciphertext Rate of Lewko’s Fully Secure IBE Scheme

  4. Cryptographic Primitives

    1. No Access

      Book Chapter

      Pages 117-131

      Accountable Trapdoor Sanitizable Signatures

    2. No Access

      Book Chapter

      Pages 132-146

      A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release

    3. No Access

      Book Chapter

      Pages 147-159

      About Hash into Montgomery Form Elliptic Curves

    4. No Access

      Book Chapter

      Pages 160-173

      Joint Triple-Base Number System for Multi-Scalar Multiplication

  5. Security Protocols

    1. No Access

      Book Chapter

      Pages 174-188

      Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks

    2. No Access

      Book Chapter

      Pages 189-203

      Secure RFID Ownership Transfer Protocols

    3. No Access

      Book Chapter

      Pages 204-217

      Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model

    4. No Access

      Book Chapter

      Pages 218-232

      Simplified PACE|AA Protocol

  6. System Security

    1. No Access

      Book Chapter

      Pages 233-247

      Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control

    2. No Access

      Book Chapter

      Pages 248-262

      Efficient Attack Detection Based on a Compressed Model

    3. No Access

      Book Chapter

      Pages 263-277

      A Digital Forensic Framework for Automated User Activity Reconstruction

    4. No Access

      Book Chapter

      Pages 278-294

      Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

previous Page of 2