Advertisement

Cryptology and Network Security

16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers

  • Srdjan Capkun
  • Sherman S. M. Chow
Conference proceedings CANS 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11261)

Also part of the Security and Cryptology book sub series (LNSC, volume 11261)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Foundation of Applied Cryptography

    1. Front Matter
      Pages 1-1
    2. Mihir Bellare, Adam O’Neill, Igors Stepanovs
      Pages 3-26
    3. José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Šala, Marjan Škrobot
      Pages 27-48
  3. Processing Encrypted Data

    1. Front Matter
      Pages 49-49
    2. Matteo Maffei, Manuel Reinert, Dominique Schröder
      Pages 51-70
    3. Daniel Demmler, Kay Hamacher, Thomas Schneider, Sebastian Stammler
      Pages 71-92
    4. Lihua Wang, Yoshinori Aono, Le Trieu Phong
      Pages 93-111
  4. Predicate Encryption

    1. Front Matter
      Pages 113-113
    2. Jonathan Katz, Matteo Maffei, Giulio Malavolta, Dominique Schröder
      Pages 115-134
    3. Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker
      Pages 135-157
  5. Credentials and Authentication

    1. Front Matter
      Pages 159-159
    2. Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa
      Pages 161-178
    3. Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks
      Pages 179-202
  6. Web Security

    1. Front Matter
      Pages 227-227
    2. Marcus Niemietz, Jörg Schwenk
      Pages 229-249
    3. Daniele E. Asoni, Samuel Hitz, Adrian Perrig
      Pages 250-273
  7. Bitcoin and Blockchain

    1. Front Matter
      Pages 275-275
    2. Indra Deep Mastan, Souradyuti Paul
      Pages 277-298
    3. Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias
      Pages 299-321
  8. Embedded System Security

    1. Front Matter
      Pages 323-323
    2. Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, Xiaobo Chu, Dengguo Feng
      Pages 325-346
    3. Tomer Ashur, Jeroen Delvaux, Sanghan Lee, Pieter Maene, Eduard Marin, Svetla Nikova et al.
      Pages 347-369
  9. Anonymous and Virtual Private Networks

    1. Front Matter
      Pages 371-371
    2. Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu
      Pages 373-389
    3. Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz
      Pages 390-412
  10. Wireless and Physical Layer Security

    1. Front Matter
      Pages 413-413
    2. Daniele Antonioli, Sandra Siby, Nils Ole Tippenhauer
      Pages 415-435
    3. Mohammad Hossein Chinaei, Diethelm Ostry, Vijay Sivaraman
      Pages 436-455
  11. Short Papers

    1. Front Matter
      Pages 457-457
    2. S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandurangan
      Pages 459-469
    3. Mayur Punekar, Qutaibah Malluhi, Yvo Desmedt, Yongee Wang
      Pages 470-481
    4. Angela Jäschke, Frederik Armknecht
      Pages 482-492
    5. Suvradip Chakraborty, Y. Sreenivasa Rao, Chandrasekaran Pandu Rangan
      Pages 493-503
    6. Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui
      Pages 504-514
    7. Robert Annessi, Tanja Zseby, Joachim Fabini
      Pages 515-525
    8. Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge
      Pages 526-536
    9. Jack Sturgess, Ivan Martinovic
      Pages 537-546
  12. Back Matter
    Pages 547-548

About these proceedings

Introduction

This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017.

The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security.

Keywords

access control anonymous networks authentication Bitcoin cryptography data mining data privacy data security electronic document identification systems encryption internet privacy privacy preserving protocols public key cryptography random oracle model signature virtual private networks Web security wireless telecommunication systems World Wide Web

Editors and affiliations

  1. 1.ETH ZürichZürichSwitzerland
  2. 2.Chinese University of Hong KongShatinHong Kong

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-02641-7
  • Copyright Information Springer Nature Switzerland AG 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-02640-0
  • Online ISBN 978-3-030-02641-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site