Ebook: Foundations and Practice of Security: 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers
- Tags: Software Engineering, Information Systems Applications (incl. Internet), Business Information Systems, Computer Appl. in Administrative Data Processing, Management of Computing and Information Systems, Computer Imaging Vision Pattern R
- Series: Lecture Notes in Computer Science 7743
- Year: 2013
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 21 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.
This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012.
The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.
This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012.
The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.
Content:
Front Matter....Pages -
MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption....Pages 1-17
Proofs of Retrievability via Fountain Code....Pages 18-32
MARC: Modified ARC4....Pages 33-44
Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements....Pages 45-61
A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes....Pages 62-77
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities....Pages 78-94
COMPASS: Authenticated Group Key Agreement from Signcryption....Pages 95-114
Classifying Online Social Network Users through the Social Graph....Pages 115-131
A Formal Derivation of Composite Trust....Pages 132-148
IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability....Pages 149-161
Policy Administration in Tag-Based Authorization....Pages 162-179
Enabling Dynamic Security Policy in the Java Security Manager....Pages 180-193
A Novel Obfuscation: Class Hierarchy Flattening....Pages 194-210
RESource: A Framework for Online Matching of Assembly with Open Source Code....Pages 211-226
Touchjacking Attacks on Web in Android, iOS, and Windows Phone....Pages 227-243
Short-Term Linkable Group Signatures with Categorized Batch Verification....Pages 244-260
GHUMVEE: Efficient, Effective, and Flexible Replication....Pages 261-277
Extracting Attack Scenarios Using Intrusion Semantics....Pages 278-292
On Securely Manipulating XML Data....Pages 293-307
Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks....Pages 308-323
QoS Aware Adaptive Security Scheme for Video Streaming in MANETs....Pages 324-340
A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC....Pages 341-356
Towards Modelling Adaptive Attacker’s Behaviour....Pages 357-364
Scalable Deniable Group Key Establishment....Pages 365-373
Information-Theoretic Foundations of Differential Privacy....Pages 374-381
Back Matter....Pages -
This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012.
The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.
Content:
Front Matter....Pages -
MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption....Pages 1-17
Proofs of Retrievability via Fountain Code....Pages 18-32
MARC: Modified ARC4....Pages 33-44
Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements....Pages 45-61
A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes....Pages 62-77
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities....Pages 78-94
COMPASS: Authenticated Group Key Agreement from Signcryption....Pages 95-114
Classifying Online Social Network Users through the Social Graph....Pages 115-131
A Formal Derivation of Composite Trust....Pages 132-148
IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability....Pages 149-161
Policy Administration in Tag-Based Authorization....Pages 162-179
Enabling Dynamic Security Policy in the Java Security Manager....Pages 180-193
A Novel Obfuscation: Class Hierarchy Flattening....Pages 194-210
RESource: A Framework for Online Matching of Assembly with Open Source Code....Pages 211-226
Touchjacking Attacks on Web in Android, iOS, and Windows Phone....Pages 227-243
Short-Term Linkable Group Signatures with Categorized Batch Verification....Pages 244-260
GHUMVEE: Efficient, Effective, and Flexible Replication....Pages 261-277
Extracting Attack Scenarios Using Intrusion Semantics....Pages 278-292
On Securely Manipulating XML Data....Pages 293-307
Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks....Pages 308-323
QoS Aware Adaptive Security Scheme for Video Streaming in MANETs....Pages 324-340
A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC....Pages 341-356
Towards Modelling Adaptive Attacker’s Behaviour....Pages 357-364
Scalable Deniable Group Key Establishment....Pages 365-373
Information-Theoretic Foundations of Differential Privacy....Pages 374-381
Back Matter....Pages -
....