000 03648nam a22003615i 4500
001 321179
003 MX-SnUAN
005 20160429161450.0
007 cr nn 008mamaa
008 160111s2015 gw | s |||| 0|eng d
020 _a9783319167459
_9978-3-319-16745-9
035 _avtls000420491
039 9 _y201601110947
_zstaff
050 4 _aQA76.9.A25
245 1 0 _aInformation security and cryptology :
_b10th international conference, inscrypt 2014, beijing, china, december 13-15, 2014, revised selected papers /
_cedited by Dongdai Lin, Moti Yung, Jianying Zhou.
264 1 _aCham :
_bSpringer International Publishing :
_bSpringer,
_c2015.
300 _axiii, 547 páginas :
_b92 ilustraciones
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8957
500 _aSpringer eBooks
505 0 _aAn Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion Tolerance -- Ring Signatures of Constant Size Without Random Oracles -- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control -- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge -- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices with Applications -- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails -- The Boomerang Attacks on BLAKE and BLAKE2 -- Second Preimage Analysis of Whirlwind -- Boomerang Attack on Step-Reduced SHA-512 -- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption -- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts -- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks -- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication -- A Note on Diem’s Proof -- Stand-by Attacks on E-ID Password Authentication -- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps -- A Lightweight Security Isolation Approach for Virtual Machines Deployment -- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aLin, Dongdai,
_eeditor.
_9329762
700 1 _aYung, Moti,
_eeditor.
_9329299
700 1 _aZhou, Jianying,
_eeditor.
_9304164
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783319167442
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-319-16745-9
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c321179
_d321179