Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II

Voorkant
Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Springer Nature, 28 aug 2020 - 478 pagina's

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic.
The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

 

Inhoudsopgave

A Breach into the Authentication with Builtin Camera ABC Protocol
3
A Practical System for PrivacyPreserving Video Surveillance
21
BiometricAuthenticated Searchable Encryption
40
A Practical Biometric Authentication Mechanism Based on 3D Fingervein
62
Privacy and Anonymity
81
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution
82
ClusterBased Anonymization of Knowledge Graphs
104
Same Point Composable and Nonmalleable Obfuscated Point Functions
124
Malicious Cooperation Between BenignLooking Processes
254
Intrusion Detection
275
Quality Evaluation of Cyber Threat Intelligence Feeds
276
Game TheoryBased Approach for Defense Against APTs
297
Software and System Security
321
GPUAssisted Software Memory Encryption
323
A New Stealthy Rooting Technique on ARM Devices
344
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables
364

A Concise Bounded Anonymous Broadcast Yielding Combinatorial TraceandRevoke Schemes
145
Secure Communication
165
MultiDevice for Signal
167
On the Cryptographic Deniability of the Signal Protocol
188
Security Analysis
210
Powerless Security
213
An Inspection and Monitoring Toolkit for TR069 6pt
233
Web Security
385
When TLS Meets Proxy on Mobile
386
Human Factors in Homograph Attack Recognition
408
Publicly Evaluatable Perceptual Hashing
436
TrollThrottleRaising the Cost of Astroturfing
456
Author Index
477
Copyright

Overige edities - Alles bekijken

Veelvoorkomende woorden en zinsdelen

Bibliografische gegevens