Limit search to items available for checkout
Title Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, proceedings / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten.
Imprint Heidelberg : Springer, 2015.


 Internet  Electronic Book    AVAILABLE
Description 1 online resource (xvii, 398 pages) : color illustrations
Series Communications in Computer and Information Science, 1865-0929 ; 557
Communications in computer and information science ; 557. 1865-0929
Bibliog. Includes bibliographical references and index.
Note Available only to authorized UTEP users.
Subject Internet -- Security measures -- Congresses.
Computer networks -- Security measures -- Congresses.
Computer science.
Computer security.
Data encryption (Computer science)
Genre Conference papers and proceedings.
Contents Intro; Preface; Organization; Invited Speeches; Memory Scrapper Attacks -- Threats and Mitigations; A Simple and Provable Secure (Authenticated) Key Exchange Based on LWE; Contents; Cryptograph; An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map; Abstract; 1 Introduction; 2 Basic Theory of the Proposed Algorithm; 2.1 Zigzag Transformation; 2.2 3-Dimension Logistic Chaotic Map; 3 Algorithm Described; 4 Simulation Result; 5 The Security Analysis; 5.1 Resistance to Exhaustive Attack; 5.1.1 Analysis of Key Space; 5.1.2 Keys' Sensitivity Analysis
5.2 Resistance to Statistical Attack5.2.1 The Grey Histogram Analysis; 5.2.2 Correlation Coefficient Analysis; 5.3 Information Entropy Analysis; 5.4 Compare the Efficiency of Encryption and Decryption; 6 Conclusion; Acknowledgements; References; An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme; 1 Introduction; 2 Preliminaries; 3 Security Analysis of Liang et al.'s CR-IB-PRE Scheme; 4 Syntax and Security Definition for CR-IB-PRE Scheme; 5 Our Improved CR-IB-PRE Scheme; 6 Security and Efficiency Analysis; 7 Conclusion; References
Cryptographic Public Key Length PredictionAbstract; 1 Introduction; 2 Key Length Prediction; 2.1 Lenstra and Verheul Equations; 2.2 Lenstra Update Equations; 2.3 The Network Working Group RFC3766; 2.4 ECRYPT and ECRYPT II; 2.5 Nist; 2.6 Anssi; 2.7 BSI; 3 Moore's Law; 4 Experiments and Environment; 5 Summary and Conclusions; References; An Image Encryption Algorithm Based on Chua's Chaos and Baker's Transformation; 1 Introduction; 2 Chaos Theory; 3 Baker's Transformation; 4 Encryption Methodology; 5 Experimental Results and Analysis; 5.1 Experimental Results; 5.2 Experimental Analysis
6 ConclusionReferences; Quantum Differential Cryptanalysis to the Block Ciphers; 1 Introduction; 2 Preliminaries; 2.1 Classical Differential Cryptanalysis; 2.2 The Bernstein -- Vazirani Algorithm; 2.3 Results After Running the Bernstein -- Vazirani Algorithm; 3 Quantum Algorithm to Execute Differential Cryptanalysis; 3.1 The First Method; 3.2 The Second Method; 4 Discussions and Conclusions; References; An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes o ... ; Abstract; 1 Introduction; 2 Preliminaries; 2.1 VPN; 2.2 Platform Security Attributes
2.3 Attribute Based Encryption3 Problem Definition; 3.1 Our Goals; 3.2 Threat Model and Assumptions; 4 Design; 4.1 Authentication Scheme Overview; 4.2 Platform Attributes Extraction; 4.3 Security Requirements Classification; 5 Implementation; 5.1 Platform Attributes Expression; 5.2 Remote Authentication Framework; 5.3 ABE Based Authentication; 5.4 Trusted Computing Based Attributes; 6 Analysis; 6.1 Security Analysis; 6.2 Performance Analysis; 7 Conclusion; References; Public Key Timed-Release Attribute-Based Encryption; 1 Introduction; 1.1 Our Contributions; 1.2 Related Work; 1.3 Organization
Summary This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
Other Author Niu, Wenjia, editor.
Li, Gang (Computer scientist), editor.
Liu, Jiqiang, editor.
Tan, Jianlong, editor.
Guo, Li, editor.
Han, Zhen, editor.
Batten, Lynn, editor.
Other Title Printed edition: 9783662486825