000796111 000__ 05250cam\a2200577Ii\4500 000796111 001__ 796111 000796111 005__ 20230306143350.0 000796111 006__ m\\\\\o\\d\\\\\\\\ 000796111 007__ cr\cnunnnunuuu 000796111 008__ 170706s2017\\\\sz\a\\\\o\\\\\101\0\eng\d 000796111 019__ $$a996432067$$a999495110 000796111 020__ $$a9783319612041$$q(electronic book) 000796111 020__ $$a3319612042$$q(electronic book) 000796111 020__ $$z9783319612034 000796111 0247_ $$a10.1007/978-3-319-61204-1$$2doi 000796111 035__ $$aSP(OCoLC)ocn992975958 000796111 035__ $$aSP(OCoLC)992975958$$z(OCoLC)996432067$$z(OCoLC)999495110 000796111 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dAZU$$dUPM$$dOCLCF$$dUAB 000796111 049__ $$aISEA 000796111 050_4 $$aQA76.9.A25 000796111 08204 $$a005.8/2$$223 000796111 1112_ $$aACNS (Conference)$$n(15th :$$d2017 :$$cKanazawa, Japan) 000796111 24510 $$aApplied cryptography and network security :$$b15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings /$$cDieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi (eds.). 000796111 2463_ $$aACNS 2017 000796111 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000796111 300__ $$a1 online resource (xvi, 710 pages) :$$billustrations. 000796111 336__ $$atext$$btxt$$2rdacontent 000796111 337__ $$acomputer$$bc$$2rdamedia 000796111 338__ $$aonline resource$$bcr$$2rdacarrier 000796111 347__ $$atext file$$bPDF$$2rda 000796111 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10355 000796111 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000796111 500__ $$aInternational conference proceedings. 000796111 500__ $$aIncludes author index. 000796111 5050_ $$aSampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography -- Simple Security Definitions for and Constructions of 0-RTT Key Exchange -- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF -- Secure and Efficient Pairing at 256-bit Security Level -- Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices -- Are You Lying: Validating the Time-Location of Outdoor Images -- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks -- A Pilot Study of Multiple Password Interference between Text and Map-based Passwords -- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security -- A Novel GPU-Based Implementation of the Cube Attack – Preliminary Results Against Trivium -- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY -- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables -- An experimental study of the BDD approach for the search LWE problem -- Efficiently Obfuscating Re-Encryption Program under DDH Assumption -- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease -- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers -- Side-Channel Attacks meet Secure Network Protocols -- Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes -- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs -- Bounds in Various Generalized Settings of the Discrete Logarithm Problem -- An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis -- Accountable Storage -- Maliciously Secure Multi-Client ORAM -- Legacy-Compliant Data Authentication for Industrial Control System Traffic -- Multi-Client Oblivious RAM Secure Against Malicious Servers -- Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols -- Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) -- How to Achieve Bounded Key Dependent Message Security -- Signature Schemes with Randomized Verification -- SCRAPE: Scalable Randomness Attested by Public Entities -- cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation -- Almost Optimal Oblivious Transfer from QA-NIZK -- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. 000796111 506__ $$aAccess limited to authorized users. 000796111 520__ $$aThis book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security. 000796111 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 6, 2017). 000796111 650_0 $$aData encryption (Computer science)$$vCongresses. 000796111 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000796111 650_0 $$aCloud computing$$vCongresses. 000796111 7001_ $$aGollmann, Dieter,$$eeditor. 000796111 7001_ $$aMiyaji, Atsuko,$$cProfessor,$$eeditor. 000796111 7001_ $$aKikuchi, Hiroaki,$$d1965-$$eeditor. 000796111 77608 $$iPrint version:$$z9783319612034 000796111 830_0 $$aLecture notes in computer science ;$$v10355.$$x0302-9743 000796111 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000796111 852__ $$bebk 000796111 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-61204-1$$zOnline Access$$91397441.1 000796111 909CO $$ooai:library.usi.edu:796111$$pGLOBAL_SET 000796111 980__ $$aEBOOK 000796111 980__ $$aBIB 000796111 982__ $$aEbook 000796111 983__ $$aOnline 000796111 994__ $$a92$$bISE