Ebook: Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings
- Tags: Computer Communication Networks, Information Systems Applications (incl. Internet), Artificial Intelligence (incl. Robotics), Algorithm Analysis and Problem Complexity, Information Storage and Retrieval, Data Encryption
- Series: Lecture Notes in Computer Science 8128
- Year: 2013
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.
Content:
Front Matter....Pages -
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock....Pages 1-15
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions....Pages 16-28
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography....Pages 29-43
Code-Based Public-Key Encryption Resistant to Key Leakage....Pages 44-54
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics....Pages 55-74
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images....Pages 75-90
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method....Pages 91-104
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack....Pages 105-121
Code-Based Identification and Signature Schemes in Software....Pages 122-136
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine....Pages 137-154
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves....Pages 155-167
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves....Pages 168-179
Cumulus4j: A Provably Secure Database Abstraction Layer....Pages 180-193
Solving the Discrete Logarithm Problem for Packing Candidate Preferences....Pages 194-208
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences....Pages 209-221
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace....Pages 222-235
Analyzing the Internet Stability in Presence of Disasters....Pages 236-252
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project....Pages 253-268
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function....Pages 269-287
Using Probabilistic Analysis for the Certification of Machine Control Systems....Pages 288-304
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms....Pages 305-320
A Multiple-Key Management Scheme in Wireless Sensor Networks....Pages 321-336
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment....Pages 337-344
A Denial of Service Attack to GSM Networks via Attach Procedure....Pages 345-360
PPM: Privacy Policy Manager for Personalized Services....Pages 361-376
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks....Pages 377-392
Intelligent UBMSS Systems for Strategic Information Management....Pages 393-407
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness....Pages 408-413
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense....Pages 414-429
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios....Pages 430-441
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process....Pages 442-456
Back Matter....Pages 457-464
....Pages -