Advertisement

Applied Cryptography and Network Security

14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings

  • Mark Manulis
  • Ahmad-Reza Sadeghi
  • Steve Schneider

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9696)

Also part of the Security and Cryptology book sub series (LNSC, volume 9696)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Authentication and Key Establishment

    1. Front Matter
      Pages 1-1
    2. Simon R. Blackburn, M. J. B. Robshaw
      Pages 3-17
    3. Stephanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
      Pages 18-35
    4. Ian Goldberg, Graeme Jenkinson, Frank Stajano
      Pages 36-57
    5. Jean Lancrenon, Marjan Škrobot, Qiang Tang
      Pages 58-76
    6. Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire
      Pages 77-94
  3. Signatures with Advanced Properties

    1. Front Matter
      Pages 95-95
    2. Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
      Pages 97-116
    3. Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
      Pages 117-136
    4. Benoît Libert, Fabrice Mouhartem, Khoa Nguyen
      Pages 137-155
    5. Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
      Pages 156-174
    6. Houda Ferradi, Rémi Géraud, Diana Maimuț, David Naccache, David Pointcheval
      Pages 175-190
  4. DoS Attacks and Network Anomaly Detection

    1. Front Matter
      Pages 191-191
    2. Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou
      Pages 193-211
    3. Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad
      Pages 212-227
  5. Deterministic and Functional Encryption

    1. Front Matter
      Pages 229-229
    2. Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada
      Pages 249-266
    3. Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
      Pages 285-303
    4. Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent  Waters
      Pages 304-323
  6. Computing on Encrypted Data

    1. Front Matter
      Pages 325-325
    2. Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Zakarias
      Pages 327-345
    3. Berry Schoenmakers, Meilof Veeningen, Niels de Vreede
      Pages 346-366
    4. Édouard Cuvelier, Olivier Pereira
      Pages 367-385
    5. Krzysztof Grining, Marek Klonowski, Piotr Syga
      Pages 386-404
    6. Angela Jäschke, Frederik Armknecht
      Pages 405-423
  7. Non-Interactive Proofs and PRFs

    1. Front Matter
      Pages 425-425
    2. Alonso González, Carla Ráfols
      Pages 427-444
    3. Hamza Abusalah, Georg Fuchsbauer
      Pages 445-463
  8. Symmetric Ciphers

    1. Front Matter
      Pages 465-465
    2. Yosuke Todo, Kazumaro Aoki
      Pages 467-484
    3. Yunwen Liu, Qingju Wang, Vincent Rijmen
      Pages 485-499
    4. Christoph Dobraunig, Maria Eichlseder, Florian Mendel
      Pages 500-517
    5. Alex Biryukov, Daniel Dinu, Johann Großschädl
      Pages 537-557
  9. Cryptography in Software

    1. Front Matter
      Pages 559-559
    2. Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque
      Pages 561-579
    3. Elena Kirshanova, Alexander May, Friedrich Wiemer
      Pages 580-591
    4. Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger
      Pages 592-608
  10. Security for Human Use

    1. Front Matter
      Pages 609-609
    2. Mauro Conti, Claudio Guarisco, Riccardo Spolaor
      Pages 611-628
    3. Weizhi Meng, Wenjuan Li, Duncan S. Wong, Jianying Zhou
      Pages 629-647
    4. Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kaafar
      Pages 648-665
  11. Back Matter
    Pages 667-668

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.
ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. 

Keywords

access control cryptanalysis data mining fault tolerance usable security

Editors and affiliations

  • Mark Manulis
    • 1
  • Ahmad-Reza Sadeghi
    • 2
  • Steve Schneider
    • 3
  1. 1.University of SurreyGuildfordUnited Kingdom
  2. 2.Technische Universität DarmstadtDarmstadtGermany
  3. 3.University of SurreyGuildfordUnited Kingdom

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-39555-5
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-39554-8
  • Online ISBN 978-3-319-39555-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site