Book Volume 9696 2016

Applied Cryptography and Network Security

14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings

Editors:

ISBN: 978-3-319-39554-8 (Print) 978-3-319-39555-5 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIV

  2. Authentication and Key Establishment

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-17

      On the Security of the Algebraic Eraser Tag Authentication Protocol

    3. No Access

      Chapter

      Pages 18-35

      A Cryptographic Analysis of UMTS/LTE AKA

    4. No Access

      Chapter

      Pages 36-57

      Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token

    5. No Access

      Chapter

      Pages 58-76

      Two More Efficient Variants of the J-PAKE Protocol

    6. No Access

      Chapter

      Pages 77-94

      Hash-Based TPM Signatures for the Quantum World

  3. Signatures with Advanced Properties

    1. Front Matter

      Pages 95-95

    2. No Access

      Chapter

      Pages 97-116

      Fuzzy Signatures: Relaxing Requirements and a New Construction

    3. No Access

      Chapter

      Pages 117-136

      Foundations of Fully Dynamic Group Signatures

    4. No Access

      Chapter

      Pages 137-155

      A Lattice-Based Group Signature Scheme with Message-Dependent Opening

    5. No Access

      Chapter

      Pages 156-174

      Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security

    6. No Access

      Chapter

      Pages 175-190

      Legally Fair Contract Signing Without Keystones

  4. DoS Attacks and Network Anomaly Detection

    1. Front Matter

      Pages 191-191

    2. No Access

      Chapter

      Pages 193-211

      Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms

    3. No Access

      Chapter

      Pages 212-227

      Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering

  5. Deterministic and Functional Encryption

    1. Front Matter

      Pages 229-229

    2. No Access

      Chapter

      Pages 231-248

      More Efficient Constructions for Inner-Product Encryption

    3. No Access

      Chapter

      Pages 249-266

      Attribute Based Encryption with Direct Efficiency Tradeoff

    4. No Access

      Chapter

      Pages 267-284

      Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions

    5. No Access

      Chapter

      Pages 285-303

      Offline Witness Encryption

    6. No Access

      Chapter

      Pages 304-323

      Deterministic Public-Key Encryption Under Continual Leakage

  6. Computing on Encrypted Data

    1. Front Matter

      Pages 325-325

    2. No Access

      Chapter

      Pages 327-345

      Better Preprocessing for Secure Multiparty Computation

    3. No Access

      Chapter

      Pages 346-366

      Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation

    4. No Access

      Chapter

      Pages 367-385

      Verifiable Multi-party Computation with Perfectly Private Audit Trail

previous Page of 2