Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information security21st Internation...
~
(1998 :)
Information security21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information securityedited by Liqun Chen, Mark Manulis, Steve Schneider.
Reminder of title:
21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
remainder title:
ISC 2018
other author:
Chen, Liqun.
corporate name:
Published:
Cham :Springer International Publishing :2018.
Description:
xi, 522 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer securityCongresses.
Online resource:
https://doi.org/10.1007/978-3-319-99136-8
ISBN:
9783319991368$q(electronic bk.)
Information security21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
Information security
21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /[electronic resource] :ISC 2018edited by Liqun Chen, Mark Manulis, Steve Schneider. - Cham :Springer International Publishing :2018. - xi, 522 p. :ill., digital ;24 cm. - Lecture notes in computer science,110600302-9743 ;. - Lecture notes in computer science ;4891..
Invited Paper -- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs -- Software Security -- Secure Code Execution: A Generic PUF-driven System Architecture -- Lumus: Dynamically Uncovering Evasive Android Applications -- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software -- How Safe is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification -- Symmetric Ciphers and Cryptanalysis -- Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy -- Automatic Search for Related-key Differential Trails in SIMON-like Block Ciphers Based on MILP -- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails -- Conditional Cube Searching and Applications on Trivium-Variant Ciphers -- Data Privacy and Anonymization -- Practical Attacks on Relational Databases Protected via Searchable Encryption -- A Simple Algorithm for Estimating Distribution Parameters from n-Dimensional Randomized Binary Responses -- Outsourcing and Assisted Computing -- Enforcing Access Control for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection -- Multi-Authority Fast Data Cloud-Outsourcing for Mobile Devices -- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT -- Offline Assisted Group Key Exchange -- Advanced Encryption -- Function-Dependent Commitments for Verifiable Multi-Party Computation -- On Constructing Pairing-free Identity-Based Encryptions -- Multi-Key Homomorphic Proxy Re-Encryption -- Verifiable Decryption for Fully Homomorphic Encryption -- Privacy-Preserving Applications -- Platform-independent Secure Blockchain-Based Voting System -- Privacy in Crowdsourcing: A Systematic Review -- Advanced Signatures -- Anonymous yet Traceable Strong Designated Verifier Signature -- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions -- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation -- Network Security -- Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic -- Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking -- Cyber-risks in the Industrial Internet of Things: towards a method for continuous assessment.
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
ISBN: 9783319991368$q(electronic bk.)
Standard No.: 10.1007/978-3-319-99136-8doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information security21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
LDR
:04196nmm a2200373 a 4500
001
543752
003
DE-He213
005
20180829125821.0
006
m d
007
cr nn 008maaau
008
190430s2018 gw s 0 eng d
020
$a
9783319991368$q(electronic bk.)
020
$a
9783319991351$q(paper)
024
7
$a
10.1007/978-3-319-99136-8
$2
doi
035
$a
978-3-319-99136-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I77 2018
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Information security
$h
[electronic resource] :
$b
21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
$c
edited by Liqun Chen, Mark Manulis, Steve Schneider.
246
3
$a
ISC 2018
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
xi, 522 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11060
490
1
$a
Security and cryptology
505
0
$a
Invited Paper -- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs -- Software Security -- Secure Code Execution: A Generic PUF-driven System Architecture -- Lumus: Dynamically Uncovering Evasive Android Applications -- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software -- How Safe is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification -- Symmetric Ciphers and Cryptanalysis -- Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy -- Automatic Search for Related-key Differential Trails in SIMON-like Block Ciphers Based on MILP -- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails -- Conditional Cube Searching and Applications on Trivium-Variant Ciphers -- Data Privacy and Anonymization -- Practical Attacks on Relational Databases Protected via Searchable Encryption -- A Simple Algorithm for Estimating Distribution Parameters from n-Dimensional Randomized Binary Responses -- Outsourcing and Assisted Computing -- Enforcing Access Control for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection -- Multi-Authority Fast Data Cloud-Outsourcing for Mobile Devices -- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT -- Offline Assisted Group Key Exchange -- Advanced Encryption -- Function-Dependent Commitments for Verifiable Multi-Party Computation -- On Constructing Pairing-free Identity-Based Encryptions -- Multi-Key Homomorphic Proxy Re-Encryption -- Verifiable Decryption for Fully Homomorphic Encryption -- Privacy-Preserving Applications -- Platform-independent Secure Blockchain-Based Voting System -- Privacy in Crowdsourcing: A Systematic Review -- Advanced Signatures -- Anonymous yet Traceable Strong Designated Verifier Signature -- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions -- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation -- Network Security -- Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic -- Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking -- Cyber-risks in the Industrial Internet of Things: towards a method for continuous assessment.
520
$a
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Data encryption (Computer science)
$3
184520
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Data Structures, Cryptology and Information Theory.
$3
273993
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Computing Milieux.
$3
275270
650
2 4
$a
Information Systems and Communication Service.
$3
274025
650
2 4
$a
Logics and Meanings of Programs.
$3
275357
700
1
$a
Chen, Liqun.
$3
277026
700
1
$a
Manulis, Mark.
$3
563384
700
1
$a
Schneider, Steve.
$3
749741
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-319-99136-8
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000161397
電子館藏
1圖書
電子書
EB QA76.9.A25 I77 2018 2018
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-319-99136-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login