Applied Cryptography and Network Security

14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings

  • Mark Manulis
  • Ahmad-Reza Sadeghi
  • Steve Schneider
Conference proceedings ACNS 2016

DOI: 10.1007/978-3-319-39555-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9696)

Table of contents (35 papers)

  1. Front Matter
    Pages I-XIV
  2. Authentication and Key Establishment

    1. Front Matter
      Pages 1-1
    2. On the Security of the Algebraic Eraser Tag Authentication Protocol
      Simon R. Blackburn, M. J. B. Robshaw
      Pages 3-17
    3. A Cryptographic Analysis of UMTS/LTE AKA
      Stephanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
      Pages 18-35
    4. Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token
      Ian Goldberg, Graeme Jenkinson, Frank Stajano
      Pages 36-57
    5. Two More Efficient Variants of the J-PAKE Protocol
      Jean Lancrenon, Marjan Škrobot, Qiang Tang
      Pages 58-76
    6. Hash-Based TPM Signatures for the Quantum World
      Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire
      Pages 77-94
  3. Signatures with Advanced Properties

    1. Front Matter
      Pages 95-95
    2. Fuzzy Signatures: Relaxing Requirements and a New Construction
      Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
      Pages 97-116
    3. Foundations of Fully Dynamic Group Signatures
      Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
      Pages 117-136
    4. A Lattice-Based Group Signature Scheme with Message-Dependent Opening
      Benoît Libert, Fabrice Mouhartem, Khoa Nguyen
      Pages 137-155
    5. Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
      Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
      Pages 156-174
    6. Legally Fair Contract Signing Without Keystones
      Houda Ferradi, Rémi Géraud, Diana Maimuț, David Naccache, David Pointcheval
      Pages 175-190
  4. DoS Attacks and Network Anomaly Detection

    1. Front Matter
      Pages 191-191
    2. Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms
      Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou
      Pages 193-211
    3. Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering
      Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad
      Pages 212-227
  5. Deterministic and Functional Encryption

    1. Front Matter
      Pages 229-229
    2. Attribute Based Encryption with Direct Efficiency Tradeoff
      Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada
      Pages 249-266

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.
ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. 

Keywords

access control cryptanalysis data mining fault tolerance usable security

Editors and affiliations

  • Mark Manulis
    • 1
  • Ahmad-Reza Sadeghi
    • 2
  • Steve Schneider
    • 3
  1. 1.University of SurreyGuildfordUnited Kingdom
  2. 2.Technische Universität DarmstadtDarmstadtGermany
  3. 3.University of SurreyGuildfordUnited Kingdom

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-39554-8
  • Online ISBN 978-3-319-39555-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349