LEADER 00000cam  2200817Mi 4500 
001    932170942 
003    OCoLC 
005    20210709131754.5 
006    m     o  d         
007    cr nn|008mamaa 
008    151107t20152015gw a    ob    101 0 eng d 
020    9783662486832 
020    3662486830 
024 7  10.1007/978-3-662-48683-2 
035    (OCoLC)932170942|z(OCoLC)932003181|z(OCoLC)985046413
       |z(OCoLC)990670729|z(OCoLC)1005800044|z(OCoLC)1011845291
       |z(OCoLC)1026461715|z(OCoLC)1058136915|z(OCoLC)1111070297
       |z(OCoLC)1112536429 
035    Springer Computer Science eBooks 2015 English+
       International 
037    com.springer.onix.9783662486832|bSpringer Nature 
040    NUI|beng|erda|epn|cNUI|dOCLCO|dAZU|dORU|dCOO|dOCLCF|dGW5XE
       |dOCLCO|dGZM|dOCLCO|dOCL|dOCLCO|dYDXCP|dKSU|dIAO|dJBG|dIAS
       |dICN|dIAD|dSOI|dILO|dVT2|dZ5A|dESU|dOCLCQ|dIOG|dU3W
       |dOCLCA|dBUF|dAU@|dUKMGB|dOCLCQ|dWYU|dEBLCP|dLIP|dREB|dUWO
       |dTKN|dOCLCQ|dDCT|dERF|dOCLCQ|dUBY|dOCLCQ|dUKAHL 
049    txum 
050  4 QA76.9.A25eb 
072  7 UR|2bicssc 
072  7 UTN|2bicssc 
072  7 COM053000|2bisacsh 
082 04 005.8|223eb 
111 2  ATIS (Conference)|n(6th :|d2015 :|cBeijing, China) 
245 10 Applications and Techniques in Information Security :|b6th
       International Conference, ATIS 2015, Beijing, China, 
       November 4-6, 2015, proceedings /|cedited by Wenjia Niu, 
       Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn
       Batten. 
264  1 Heidelberg :|bSpringer,|c2015. 
264  4 |c©2015 
300    1 online resource (xvii, 398 pages) :|bcolor illustrations
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
347    |bPDF 
490 1  Communications in Computer and Information Science,|x1865-
       0929 ;|v557 
504    Includes bibliographical references and index. 
504    Includes bibliographical references and index. 
505 0  Intro; Preface; Organization; Invited Speeches; Memory 
       Scrapper Attacks -- Threats and Mitigations; A Simple and 
       Provable Secure (Authenticated) Key Exchange Based on LWE;
       Contents; Cryptograph; An Image Encryption Algorithm Based
       on Zigzag Transformation and 3-Dimension Chaotic Logistic 
       Map; Abstract; 1 Introduction; 2 Basic Theory of the 
       Proposed Algorithm; 2.1 Zigzag Transformation; 2.2 3-
       Dimension Logistic Chaotic Map; 3 Algorithm Described; 4 
       Simulation Result; 5 The Security Analysis; 5.1 Resistance
       to Exhaustive Attack; 5.1.1 Analysis of Key Space; 5.1.2 
       Keys' Sensitivity Analysis 
505 8  5.2 Resistance to Statistical Attack5.2.1 The Grey 
       Histogram Analysis; 5.2.2 Correlation Coefficient 
       Analysis; 5.3 Information Entropy Analysis; 5.4 Compare 
       the Efficiency of Encryption and Decryption; 6 Conclusion;
       Acknowledgements; References; An Improved Cloud-Based 
       Revocable Identity-Based Proxy Re-encryption Scheme; 1 
       Introduction; 2 Preliminaries; 3 Security Analysis of 
       Liang et al.'s CR-IB-PRE Scheme; 4 Syntax and Security 
       Definition for CR-IB-PRE Scheme; 5 Our Improved CR-IB-PRE 
       Scheme; 6 Security and Efficiency Analysis; 7 Conclusion; 
       References 
505 8  Cryptographic Public Key Length PredictionAbstract; 1 
       Introduction; 2 Key Length Prediction; 2.1 Lenstra and 
       Verheul Equations; 2.2 Lenstra Update Equations; 2.3 The 
       Network Working Group RFC3766; 2.4 ECRYPT and ECRYPT II; 
       2.5 Nist; 2.6 Anssi; 2.7 BSI; 3 Moore's Law; 4 Experiments
       and Environment; 5 Summary and Conclusions; References; An
       Image Encryption Algorithm Based on Chua's Chaos and 
       Baker's Transformation; 1 Introduction; 2 Chaos Theory; 3 
       Baker's Transformation; 4 Encryption Methodology; 5 
       Experimental Results and Analysis; 5.1 Experimental 
       Results; 5.2 Experimental Analysis 
505 8  6 ConclusionReferences; Quantum Differential Cryptanalysis
       to the Block Ciphers; 1 Introduction; 2 Preliminaries; 2.1
       Classical Differential Cryptanalysis; 2.2 The Bernstein --
       Vazirani Algorithm; 2.3 Results After Running the 
       Bernstein -- Vazirani Algorithm; 3 Quantum Algorithm to 
       Execute Differential Cryptanalysis; 3.1 The First Method; 
       3.2 The Second Method; 4 Discussions and Conclusions; 
       References; An Enhanced Authentication Scheme for Virtual 
       Private Network Access Based on Platform Attributes o ... 
       ; Abstract; 1 Introduction; 2 Preliminaries; 2.1 VPN; 2.2 
       Platform Security Attributes 
505 8  2.3 Attribute Based Encryption3 Problem Definition; 3.1 
       Our Goals; 3.2 Threat Model and Assumptions; 4 Design; 4.1
       Authentication Scheme Overview; 4.2 Platform Attributes 
       Extraction; 4.3 Security Requirements Classification; 5 
       Implementation; 5.1 Platform Attributes Expression; 5.2 
       Remote Authentication Framework; 5.3 ABE Based 
       Authentication; 5.4 Trusted Computing Based Attributes; 6 
       Analysis; 6.1 Security Analysis; 6.2 Performance Analysis;
       7 Conclusion; References; Public Key Timed-Release 
       Attribute-Based Encryption; 1 Introduction; 1.1 Our 
       Contributions; 1.2 Related Work; 1.3 Organization 
506    Available only to authorized UTEP users. 
506    Available only to authorized UTEP users. 
520    This book constitutes the refereed proceedings of the 
       International Conference on Applications and Techniques in
       Information Security, ATIS 2015, held in Beijing, China, 
       in November 2015. The 25 revised full papers and 10 short 
       papers presented were carefully reviewed and selected from
       103 submissions. The papers are organized in topical 
       sections on invited speeches; cryptograph; evaluation, 
       standards and protocols; trust computing and privacy 
       protection; cloud security and applications; tools and 
       methodologies; system design and implementations. 
546    English. 
546    English. 
650  0 Internet|xSecurity measures|vCongresses. 
650  0 Computer networks|xSecurity measures|vCongresses. 
650  0 Computer science. 
650  0 Computer security. 
650  0 Data encryption (Computer science) 
650  0 Algorithms. 
655  7 Conference papers and proceedings.|2fast
       |0(OCoLC)fst01423772 
700 1  Niu, Wenjia,|eeditor. 
700 1  Li, Gang|c(Computer scientist),|eeditor. 
700 1  Liu, Jiqiang,|eeditor. 
700 1  Tan, Jianlong,|eeditor. 
700 1  Guo, Li,|eeditor. 
700 1  Han, Zhen,|eeditor. 
700 1  Batten, Lynn,|eeditor. 
776 08 |iPrinted edition:|z9783662486825 
830  0 Communications in computer and information science ;|v557.
       |x1865-0929 
856 40 |uhttp://0-link.springer.com.lib.utep.edu/10.1007/978-3-
       662-48683-2|zTo access this resource 
LOCATION CALL # STATUS
 Internet  Electronic Book    AVAILABLE