語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security21st Internation...
~
(1998 :)
Information security21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information securityedited by Liqun Chen, Mark Manulis, Steve Schneider.
其他題名:
21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
其他題名:
ISC 2018
其他作者:
Chen, Liqun.
團體作者:
出版者:
Cham :Springer International Publishing :2018.
面頁冊數:
xi, 522 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer securityCongresses.
電子資源:
https://doi.org/10.1007/978-3-319-99136-8
ISBN:
9783319991368$q(electronic bk.)
Information security21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
Information security
21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /[electronic resource] :ISC 2018edited by Liqun Chen, Mark Manulis, Steve Schneider. - Cham :Springer International Publishing :2018. - xi, 522 p. :ill., digital ;24 cm. - Lecture notes in computer science,110600302-9743 ;. - Lecture notes in computer science ;4891..
Invited Paper -- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs -- Software Security -- Secure Code Execution: A Generic PUF-driven System Architecture -- Lumus: Dynamically Uncovering Evasive Android Applications -- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software -- How Safe is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification -- Symmetric Ciphers and Cryptanalysis -- Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy -- Automatic Search for Related-key Differential Trails in SIMON-like Block Ciphers Based on MILP -- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails -- Conditional Cube Searching and Applications on Trivium-Variant Ciphers -- Data Privacy and Anonymization -- Practical Attacks on Relational Databases Protected via Searchable Encryption -- A Simple Algorithm for Estimating Distribution Parameters from n-Dimensional Randomized Binary Responses -- Outsourcing and Assisted Computing -- Enforcing Access Control for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection -- Multi-Authority Fast Data Cloud-Outsourcing for Mobile Devices -- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT -- Offline Assisted Group Key Exchange -- Advanced Encryption -- Function-Dependent Commitments for Verifiable Multi-Party Computation -- On Constructing Pairing-free Identity-Based Encryptions -- Multi-Key Homomorphic Proxy Re-Encryption -- Verifiable Decryption for Fully Homomorphic Encryption -- Privacy-Preserving Applications -- Platform-independent Secure Blockchain-Based Voting System -- Privacy in Crowdsourcing: A Systematic Review -- Advanced Signatures -- Anonymous yet Traceable Strong Designated Verifier Signature -- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions -- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation -- Network Security -- Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic -- Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking -- Cyber-risks in the Industrial Internet of Things: towards a method for continuous assessment.
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
ISBN: 9783319991368$q(electronic bk.)
Standard No.: 10.1007/978-3-319-99136-8doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information security21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
LDR
:04196nmm a2200373 a 4500
001
543752
003
DE-He213
005
20180829125821.0
006
m d
007
cr nn 008maaau
008
190430s2018 gw s 0 eng d
020
$a
9783319991368$q(electronic bk.)
020
$a
9783319991351$q(paper)
024
7
$a
10.1007/978-3-319-99136-8
$2
doi
035
$a
978-3-319-99136-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I77 2018
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Information security
$h
[electronic resource] :
$b
21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018 : proceedings /
$c
edited by Liqun Chen, Mark Manulis, Steve Schneider.
246
3
$a
ISC 2018
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
xi, 522 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11060
490
1
$a
Security and cryptology
505
0
$a
Invited Paper -- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs -- Software Security -- Secure Code Execution: A Generic PUF-driven System Architecture -- Lumus: Dynamically Uncovering Evasive Android Applications -- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software -- How Safe is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification -- Symmetric Ciphers and Cryptanalysis -- Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy -- Automatic Search for Related-key Differential Trails in SIMON-like Block Ciphers Based on MILP -- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails -- Conditional Cube Searching and Applications on Trivium-Variant Ciphers -- Data Privacy and Anonymization -- Practical Attacks on Relational Databases Protected via Searchable Encryption -- A Simple Algorithm for Estimating Distribution Parameters from n-Dimensional Randomized Binary Responses -- Outsourcing and Assisted Computing -- Enforcing Access Control for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection -- Multi-Authority Fast Data Cloud-Outsourcing for Mobile Devices -- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT -- Offline Assisted Group Key Exchange -- Advanced Encryption -- Function-Dependent Commitments for Verifiable Multi-Party Computation -- On Constructing Pairing-free Identity-Based Encryptions -- Multi-Key Homomorphic Proxy Re-Encryption -- Verifiable Decryption for Fully Homomorphic Encryption -- Privacy-Preserving Applications -- Platform-independent Secure Blockchain-Based Voting System -- Privacy in Crowdsourcing: A Systematic Review -- Advanced Signatures -- Anonymous yet Traceable Strong Designated Verifier Signature -- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions -- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation -- Network Security -- Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic -- Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking -- Cyber-risks in the Industrial Internet of Things: towards a method for continuous assessment.
520
$a
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Data encryption (Computer science)
$3
184520
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Data Structures, Cryptology and Information Theory.
$3
273993
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Computing Milieux.
$3
275270
650
2 4
$a
Information Systems and Communication Service.
$3
274025
650
2 4
$a
Logics and Meanings of Programs.
$3
275357
700
1
$a
Chen, Liqun.
$3
277026
700
1
$a
Manulis, Mark.
$3
563384
700
1
$a
Schneider, Steve.
$3
749741
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-319-99136-8
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000161397
電子館藏
1圖書
電子書
EB QA76.9.A25 I77 2018 2018
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-319-99136-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入