Advertisement

Security Engineering and Intelligence Informatics

CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings

  • Alfredo Cuzzocrea
  • Christian Kittl
  • Dimitris E. Simos
  • Edgar Weippl
  • Lida Xu

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8128)

Table of contents

  1. Front Matter
  2. Modern Cryptography

    1. Symmetric-Key Cryptography

    2. Public-Key Cryptography

      1. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
        Pages 55-74
    3. Algorithmic Cryptanalysis

  3. Security Engineering

    1. Software and Hardware Implementation of Cryptographic Algorithms

      1. Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann
        Pages 122-136
      2. Danilo Câmara, Conrado P. L. Gouvêa, Julio López, Ricardo Dahab
        Pages 137-154
    2. Database Encryption

      1. Matthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber
        Pages 180-193
    3. Interaction between Cryptographic Theory and Implementation Issues

      1. Andreas Hülsing, Lea Rausch, Johannes Buchmann
        Pages 194-208
      2. James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia
        Pages 209-221
      3. Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen
        Pages 222-235
    4. Cyber Security and Dependability

      1. Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione
        Pages 236-252
      2. Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis
        Pages 253-268
      3. Thomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui
        Pages 269-287
      4. Atif Mashkoor, Osman Hasan, Wolfgang Beer
        Pages 305-320
      5. Suliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad van Moorsel
        Pages 321-336
    5. Network Security and Privacy

      1. Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang et al.
        Pages 337-344
      2. Nicola Gobbo, Alessio Merlo, Mauro Migliardi
        Pages 361-376
      3. Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake
        Pages 377-392
      4. Bo Liu, Baokang Zhao, Bo Liu, Chunqing Wu
        Pages 393-407
    6. Multimedia Technology for Homeland Defense

      1. Lidia Ogiela, Marek R. Ogiela
        Pages 408-413
      2. Arcangelo Castiglione, Ciriaco D’Ambrosio, Alfredo De Santis, Francesco Palmieri
        Pages 414-429
      3. Francesco Flammini, Stefano Marrone, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini
        Pages 442-456
  4. Back Matter

Other volumes

  1. IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings
  2. Security Engineering and Intelligence Informatics
    CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings

About these proceedings

Introduction

This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.

Keywords

algebraic cryptanalysis elliptic curve cryptography geovisualization malware probabilistic modeling

Editors and affiliations

  • Alfredo Cuzzocrea
    • 1
  • Christian Kittl
    • 2
  • Dimitris E. Simos
    • 3
  • Edgar Weippl
    • 4
  • Lida Xu
    • 5
  1. 1.ICAR-CNRUniversity of CalabriaRende CosenzaItaly
  2. 2.Evolaris Next LevelGrazAustria
  3. 3.SBA ResearchViennaAustria
  4. 4.SBA Research, Institute of Software Technology and Interactive SystemsVienna University of TechnologyWienAustria
  5. 5.Information Technology and Decision SciencesOld Dominion UniversityNorfolkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-40588-4
  • Copyright Information IFIP International Federation for Information Processing 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-40587-7
  • Online ISBN 978-3-642-40588-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site