Security and Cryptography for Networks

10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings

  • Vassilis Zikas
  • Roberto De Prisco
Conference proceedings SCN 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9841)

Also part of the Security and Cryptology book sub series (LNSC, volume 9841)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Encryption

    1. Front Matter
      Pages 1-1
    2. Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
      Pages 3-22
    3. Jie Chen, Benoît Libert, Somindu C. Ramanna
      Pages 23-41
    4. Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada
      Pages 42-61
    5. Silvio Biagioni, Daniel Masny, Daniele Venturi
      Pages 62-80
  3. Memory Protection

    1. Front Matter
      Pages 81-81
    2. Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi
      Pages 83-103
    3. Jan Camenisch, Robert R. Enderlein, Ueli Maurer
      Pages 104-125
  4. Multi-party Computation

    1. Front Matter
      Pages 127-127
    2. Ran Cohen, Chris Peikert
      Pages 129-146
    3. Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
      Pages 147-168
    4. Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV
      Pages 169-187
  5. Zero-Knowledge Proofs

    1. Front Matter
      Pages 189-189
    2. Arno Mittelbach, Daniele Venturi
      Pages 198-215
    3. Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
      Pages 216-236
    4. Yi Deng, Juan Garay, San Ling, Huaxiong Wang, Moti Yung
      Pages 237-253
  6. Efficient Protocols

    1. Front Matter
      Pages 255-255

About these proceedings

Introduction

This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016.

The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.

Keywords

authentication data encryption formal methods and theory of security network security secure multiparty computation adaptive security cryptographic primitives cryptographic protocols fuzzy search oblivious transfer password-based authentication privacy-preserving protocols secret sharing security and privacy security protocols side-channel attack signature schemes spatial encryption symmetric encryption

Editors and affiliations

  • Vassilis Zikas
    • 1
  • Roberto De Prisco
    • 2
  1. 1.Rensselaer Polytechnic InstituteTroyUSA
  2. 2.University of SalernoFiscianoItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-44618-9
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-44617-2
  • Online ISBN 978-3-319-44618-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book