Cryptology and Network Security

14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings

  • Michael Reiter
  • David Naccache

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9476)

Also part of the Security and Cryptology book sub series (LNSC, volume 9476)

Table of contents

  1. Front Matter
    Pages I-X
  2. Internet of Things and Privacy

    1. Front Matter
      Pages 1-1
    2. Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
      Pages 3-18
    3. Imane Bouij-Pasquier, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort
      Pages 19-31
    4. Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
      Pages 32-39
  3. Password-Based Authentication

    1. Front Matter
      Pages 41-41
    2. Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci
      Pages 43-58
    3. Yutaka Kawai, Takato Hirano, Yoshihiro Koseki, Tatsuji Munaka
      Pages 75-91
  4. Attacks and Malicious Code

    1. Front Matter
      Pages 93-93
    2. S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena
      Pages 95-110
    3. Fatih Kilic, Claudia Eckert
      Pages 111-118
    4. Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò
      Pages 119-126
  5. Security Modeling and Verification

    1. Front Matter
      Pages 127-127
    2. Bei Liang, Hongda Li, Jinyong Chang
      Pages 129-143
    3. Aida Ben Chehida Douss, Ryma Abassi, Nihel Ben Youssef, Sihem Guemara El Fatmi
      Pages 144-159
  6. Secure Multi-party Computation

    1. Front Matter
      Pages 177-177
    2. Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada
      Pages 179-196
    3. Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle
      Pages 197-213

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. 

The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.

Keywords

authentication cryptographic models cryptography encryption Internet of Things (IoT) malware network security passwords privacy secure multi-party communication security security verification

Editors and affiliations

  • Michael Reiter
    • 1
  • David Naccache
    • 2
  1. 1.Department of Computer ScienceUNC Chapel HillCHAPEL HILLUSA
  2. 2.Départment d'InformatiqueEcole Normale SupérieureParisFrench Southern Territories

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-26823-1
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-26822-4
  • Online ISBN 978-3-319-26823-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site