skip to content
Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings Preview this item
ClosePreview this item
Checking...

Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings

Author: Xinyi Huang, (Computer scientist); Jianying Zhou
Publisher: Cham : Springer, 2014.
Series: Lecture notes in computer science, 8434.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security;  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Ebook
Congresses
Additional Physical Format: Printed edition:
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Xinyi Huang, (Computer scientist); Jianying Zhou
ISBN: 9783319063201 3319063200 3319063197 9783319063195
OCLC Number: 879174215
Notes: International conference proceedings.
Includes author index.
Description: 1 online resource (xiv, 578 pages) : illustrations.
Contents: Access Control in and Around the Browser --
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools --
Preserving Receiver-Location Privacy in Wireless Sensor Networks --
Data Security and Privacy in the Cloud --
Forbidden City Model --
Towards a Practice Relevant Framework for Designing Cryptographic Protocols --
A CAPTCHA Scheme Based on the Identification of Character Locations --
A Multi process Mechanism of Evading Behavior-Based Bot Detection Approaches --
Obfuscating Encrypted Web Traffic with Combined Objects --
A Website Credibility Assessment Scheme Based on Page Association --
A Methodology for Hook-Based Kernel Level Rootkits --
Precise Instruction-Level Side Channel Profiling of Embedded Processors --
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model --
SBE --
A Precise Shell code Detection Engine Based on Emulation and Support Vector Machine --
HDROP: Detecting ROP Attacks Using Performance Monitoring Counters --
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs --
High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit --
A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm --
Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis --
Implementing a Covert Timing Channel Based on Mimic Function --
Detecting Frame Deletion in H.264 Video --
Efficient Adaptive Oblivious Transfer in UC Framework --
Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes --
Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing --
Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups --
Proofs of Retrievability Based on MRD Codes --
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing --
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures --
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database --
A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience --
Two-Party (Blind) Ring Signatures and Their Applications --
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model --
Attribute-Based Signature with Message Recovery --
Encryption and Key Agreement An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing --
Multi-recipient Encryption in Heterogeneous Setting --
ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage --
Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement --
New Variants of Lattice Problems and Their NP-Hardness --
Improved Preimage Attacks against Reduced HAS-160 --
Modular Inversion Hidden Number Problem Revisited --
On the Recursive Construction of MDS Matrices for Lightweight Cryptography --
On Constructions of Circulant MDS Matrices for Lightweight Cryptography.
Series Title: Lecture notes in computer science, 8434.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: ISPEC 2014
Responsibility: Xinyi Huang, Jianying Zhou (eds.).
More information:

Abstract:

This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/879174215> # Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "879174215" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1880054005#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://experiment.worldcat.org/entity/work/data/1880054005#Topic/data_encryption> ; # Data Encryption
    schema:about <http://experiment.worldcat.org/entity/work/data/1880054005#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1880054005#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1880054005#Topic/management_of_computing_and_information_systems> ; # Management of Computing and Information Systems
    schema:about <http://experiment.worldcat.org/entity/work/data/1880054005#Topic/computer_science> ; # Computer Science
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1880054005#Topic/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/1880054005#Topic/systems_and_data_security> ; # Systems and Data Security
    schema:alternateName "ISPEC 2014" ;
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/1880054005#Meeting/ispec_conference_10th_2014_fuzhou_china> ; # ISPEC (Conference) (10th : 2014 : Fuzhou, China)
    schema:datePublished "2014" ;
    schema:description "This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory."@en ;
    schema:description "Access Control in and Around the Browser -- Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools -- Preserving Receiver-Location Privacy in Wireless Sensor Networks -- Data Security and Privacy in the Cloud -- Forbidden City Model -- Towards a Practice Relevant Framework for Designing Cryptographic Protocols -- A CAPTCHA Scheme Based on the Identification of Character Locations -- A Multi process Mechanism of Evading Behavior-Based Bot Detection Approaches -- Obfuscating Encrypted Web Traffic with Combined Objects -- A Website Credibility Assessment Scheme Based on Page Association -- A Methodology for Hook-Based Kernel Level Rootkits -- Precise Instruction-Level Side Channel Profiling of Embedded Processors -- Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model -- SBE -- A Precise Shell code Detection Engine Based on Emulation and Support Vector Machine -- HDROP: Detecting ROP Attacks Using Performance Monitoring Counters -- Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs -- High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit -- A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm -- Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis -- Implementing a Covert Timing Channel Based on Mimic Function -- Detecting Frame Deletion in H.264 Video -- Efficient Adaptive Oblivious Transfer in UC Framework -- Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes -- Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing -- Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups -- Proofs of Retrievability Based on MRD Codes -- TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing -- Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures -- Distributed Pseudo-Random Number Generation and Its Application to Cloud Database -- A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience -- Two-Party (Blind) Ring Signatures and Their Applications -- Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model -- Attribute-Based Signature with Message Recovery -- Encryption and Key Agreement An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing -- Multi-recipient Encryption in Heterogeneous Setting -- ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage -- Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement -- New Variants of Lattice Problems and Their NP-Hardness -- Improved Preimage Attacks against Reduced HAS-160 -- Modular Inversion Hidden Number Problem Revisited -- On the Recursive Construction of MDS Matrices for Lightweight Cryptography -- On Constructions of Circulant MDS Matrices for Lightweight Cryptography."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/1880054005#Person/huang_xinyi_computer_scientist> ; # (Computer scientist) Xinyi Huang
    schema:editor <http://experiment.worldcat.org/entity/work/data/1880054005#Person/zhou_jianying> ; # Jianying Zhou
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1880054005> ;
    schema:genre "Ebook"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1880054005#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1880054005#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isSimilarTo <http://worldcat.org/entity/work/data/1880054005#CreativeWork/> ;
    schema:name "Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings"@en ;
    schema:productID "879174215" ;
    schema:url <http://dx.doi.org/10.1007/978-3-319-06320-1> ;
    schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=3092957> ;
    schema:workExample <http://worldcat.org/isbn/9783319063195> ;
    schema:workExample <http://worldcat.org/isbn/9783319063201> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-06320-1> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB449402> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/879174215> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1880054005#Meeting/ispec_conference_10th_2014_fuzhou_china> # ISPEC (Conference) (10th : 2014 : Fuzhou, China)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/1880054005#Place/fuzhou_china> ; # Fuzhou, China)
    schema:name "ISPEC (Conference) (10th : 2014 : Fuzhou, China)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Person/huang_xinyi_computer_scientist> # (Computer scientist) Xinyi Huang
    a schema:Person ;
    schema:familyName "Huang" ;
    schema:givenName "Xinyi" ;
    schema:name "(Computer scientist) Xinyi Huang" ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Person/zhou_jianying> # Jianying Zhou
    a schema:Person ;
    schema:familyName "Zhou" ;
    schema:givenName "Jianying" ;
    schema:name "Jianying Zhou" ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Place/fuzhou_china> # Fuzhou, China)
    a schema:Place ;
    schema:name "Fuzhou, China)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/879174215> ; # Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/879174215> ; # Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Topic/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Topic/management_of_computing_and_information_systems> # Management of Computing and Information Systems
    a schema:Intangible ;
    schema:name "Management of Computing and Information Systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1880054005#Topic/systems_and_data_security> # Systems and Data Security
    a schema:Intangible ;
    schema:name "Systems and Data Security"@en ;
    .

<http://worldcat.org/entity/work/data/1880054005#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/879174215> ; # Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
    .

<http://worldcat.org/isbn/9783319063195>
    a schema:ProductModel ;
    schema:description "print" ;
    schema:isbn "3319063197" ;
    schema:isbn "9783319063195" ;
    .

<http://worldcat.org/isbn/9783319063201>
    a schema:ProductModel ;
    schema:description "electronic bk." ;
    schema:isbn "3319063200" ;
    schema:isbn "9783319063201" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/879174215> ; # Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture Notes in Computer Science," ;
    .

<http://www.worldcat.org/title/-/oclc/879174215>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/879174215> ; # Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
    schema:dateModified "2016-07-13" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.