001437963 000__ 06746cam\a2200733\a\4500 001437963 001__ 1437963 001437963 003__ OCoLC 001437963 005__ 20230309004241.0 001437963 006__ m\\\\\o\\d\\\\\\\\ 001437963 007__ cr\un\nnnunnun 001437963 008__ 210710s2021\\\\sz\\\\\\o\\\\\101\0\eng\d 001437963 019__ $$a1259510119$$a1266811090 001437963 020__ $$a9783030808518$$q(electronic bk.) 001437963 020__ $$a3030808513$$q(electronic bk.) 001437963 020__ $$z9783030808501 001437963 020__ $$z3030808505 001437963 0247_ $$a10.1007/978-3-030-80851-8$$2doi 001437963 035__ $$aSP(OCoLC)1259594026 001437963 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dYDX$$dOCLCO$$dEBLCP$$dOCLCF$$dDCT$$dN$T$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001437963 049__ $$aISEA 001437963 050_4 $$aQA76.9.A25 001437963 08204 $$a005.8/24$$223 001437963 1112_ $$aInternational Conference on Applied Cryptography in Computer and Communications$$n(1st :$$d2021 :$$cOnline) 001437963 24510 $$aApplied cryptography in computer and communications :$$bfirst EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, Proceedings /$$cBo Chen, Xinyi Huang (eds.). 001437963 2463_ $$aAC3 2021 001437963 260__ $$aCham :$$bSpringer,$$c2021. 001437963 300__ $$a1 online resource (216 pages) 001437963 336__ $$atext$$btxt$$2rdacontent 001437963 337__ $$acomputer$$bc$$2rdamedia 001437963 338__ $$aonline resource$$bcr$$2rdacarrier 001437963 347__ $$atext file 001437963 347__ $$bPDF 001437963 4901_ $$aLecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;$$v386 001437963 500__ $$aEfficient and Private Divisible Double Auction in Trusted Execution Environment. 001437963 500__ $$aIncludes author index. 001437963 5050_ $$aIntro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model 001437963 5058_ $$a3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries 001437963 5058_ $$a3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels 001437963 5058_ $$a2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture -- 4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization 001437963 5058_ $$a2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation 001437963 506__ $$aAccess limited to authorized users. 001437963 520__ $$aThis book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT). The conference was held in May 2021 and due to COVID-19 pandemic virtually. The 15 revised full papers were carefully reviewed and selected from 42 submissions. The papers present are grouped in 4 tracks on blockchain; authentication; secure computation; practical crypto application. They detail technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices. 001437963 588__ $$aDescription based on print version record. 001437963 650_0 $$aData encryption (Computer science)$$vCongresses. 001437963 650_0 $$aTelecommunication systems$$xSecurity measures$$vCongresses. 001437963 650_0 $$aInternet of things$$xSecurity measures$$vCongresses. 001437963 650_6 $$aChiffrement (Informatique)$$vCongrès. 001437963 650_6 $$aSystèmes de télécommunications$$xSécurité$$xMesures$$vCongrès. 001437963 650_6 $$aInternet des objets$$xSécurité$$xMesures$$vCongrès. 001437963 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001437963 655_7 $$aConference papers and proceedings.$$2lcgft 001437963 655_7 $$aActes de congrès.$$2rvmgf 001437963 655_0 $$aElectronic books. 001437963 7001_ $$aChen, Bo. 001437963 7001_ $$aHuang, Xinyi$$c(Computer scientist) 001437963 7112_ $$aInternational Workshop on Security for Internet of Things$$n(1st :$$d2021 :$$cOnline) 001437963 77608 $$iPrint version:$$aChen, Bo.$$tApplied Cryptography in Computer and Communications.$$dCham : Springer International Publishing AG, ©2021$$z9783030808501 001437963 830_0 $$aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;$$v386. 001437963 852__ $$bebk 001437963 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-80851-8$$zOnline Access$$91397441.1 001437963 909CO $$ooai:library.usi.edu:1437963$$pGLOBAL_SET 001437963 980__ $$aBIB 001437963 980__ $$aEBOOK 001437963 982__ $$aEbook 001437963 983__ $$aOnline 001437963 994__ $$a92$$bISE