Advertisement

Cryptology and Network Security

13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings

  • Dimitris Gritzalis
  • Aggelos Kiayias
  • Ioannis Askoxylakis
Conference proceedings CANS 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8813)

Table of contents

  1. Front Matter
  2. Michael Clear, Ciarán McGoldrick
    Pages 1-19
  3. Hui Guo, Zhenfeng Zhang, Jiang Zhang
    Pages 20-33
  4. Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu
    Pages 34-49
  5. Bart Mennink, Bart Preneel
    Pages 50-63
  6. Yosuke Todo, Kazumaro Aoki
    Pages 64-81
  7. Tuomas Kortelainen, Juha Kortelainen
    Pages 98-110
  8. Amir Herzberg, Haya Shulman
    Pages 111-126
  9. Matthias Wachs, Martin Schanzenbach, Christian Grothoff
    Pages 127-142
  10. Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento
    Pages 143-158
  11. Koutarou Suzuki, Kazuki Yoneyama
    Pages 159-174
  12. Akanksha Sharma, Subrat Kumar Dash
    Pages 191-205
  13. Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders, Jacques Traoré
    Pages 206-221
  14. Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa
    Pages 222-239
  15. Sourya Joyee De, Sushmita Ruj, Asim K. Pal
    Pages 240-255
  16. Ali El Kaafarani, Liqun Chen, Essam Ghadafi, James Davenport
    Pages 256-269
  17. Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers
    Pages 270-289
  18. Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa
    Pages 290-304

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.

Keywords

android malware detection biometrics cryptographic models data encryption electronic commerce elliptic curves hash functions interoperability network security pairing-based cryptography protection security security integrity protection security integrity protection time-series data

Editors and affiliations

  • Dimitris Gritzalis
    • 1
  • Aggelos Kiayias
    • 2
  • Ioannis Askoxylakis
    • 3
  1. 1.Department of InformaticsAthens University of Economics & BusinessAthensGreece
  2. 2.Department of Informatics and Telecommunications, PanepistimiopolisNational and Kapodistrian University of AthensAthensGreece
  3. 3.FORTH-ICS, Vassilika VoutonHeraklionGreece

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-12280-9
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-12279-3
  • Online ISBN 978-3-319-12280-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site