Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings

Front Cover
Phong Q. Nguyen, Jianying Zhou
Springer, Nov 13, 2017 - Computers - 474 pages
0 Reviews
This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.
The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

RateOne AE with Security Under RUP
3
An Improved SATBased GuessandDetermine Attack on the Alternating Step Generator
21
Efficient Masking of ARXBased Block Ciphers Using CarrySave Addition on Boolean Shares
39
Improved Automatic Search Tool for RelatedKey Differential Characteristics on ByteOriented Block Ciphers
58
Postquantum Cryptography
77
Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU
79
ZeroKnowledge Password Policy Check from Lattices
92
Generic ForwardSecure Key Agreement Without Signatures
114
An ART BehaviorMask Attack
269
Privacy
288
Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks
291
A Differentially Private Encryption Scheme
309
Mobile Security
327
Automatic Security Modes Based on Contexts
328
Protecting Mandatory Access Control System Integrity from Malicious Execution Environment on ARMBased Mobile Devices
348
Enforcing ACL Access Control on Android Platform
366

PublicKey Cryptography
134
A ConstantSize Signature Scheme with Tighter Reduction from CDH Assumption
137
HomomorphicPolicy AttributeBased Key Encapsulation Mechanisms
155
Watermarking PublicKey Cryptographic Functionalities and Implementations
173
Authentication
192
Contactless Access Control Based on Distance Bounding
195
Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis
214
Attacks
230
LowLevel Attacks in Bitcoin Wallets
233
Improving Password Guessing Using Byte Pair Encoding
254
Software Security
384
Translating Embedded VM Code in x86 Binary Executables
385
RunTime Verification for Observational Determinism Using Dynamic Program Slicing
405
Automated Analysis of Accountability
417
Network and System Security
435
Visualization of Intrusion Detection Alarms Collected from Multiple Networks
437
Keep Your Hosts Away from USB Attacks
455
Author Index
472
Copyright

Other editions - View all

Common terms and phrases