Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings
This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The confere...
Saved in:
| Main Authors | , |
|---|---|
| Format | eBook Conference Proceeding |
| Language | English |
| Published |
Cham
Springer Nature
2016
Springer International Publishing AG Springer International Publishing Springer |
| Edition | 1 |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 331945871X 9783319458717 3319458701 9783319458700 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/978-3-319-45871-7 |
Cover
| Abstract | This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The conference focuses on following subjects technical aspects of information security, cryptanalysis, cryptographic protocols, network and systems security and access control, privacy and watermarking, software security, encryption, signatures and fundamentals. |
|---|---|
| AbstractList | This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The conference focuses on following subjects technical aspects of information security, cryptanalysis, cryptographic protocols, network and systems security and access control, privacy and watermarking, software security, encryption, signatures and fundamentals. |
| Author | Bishop, Matt Nascimento, Anderson C. a |
| Author_xml | – sequence: 1 fullname: Bishop, Matt – sequence: 2 fullname: Nascimento, Anderson C. a |
| BookMark | eNqN0D1PwzAQBmADBdGWbixsiAUxmPozZ49QFahUiQGE2CzHddrQNC5xCuLfkzYIMTJZJz_vK931UKcMpUfojJJrSggMNSjMMacaC6mAYthDPd6Mu-l1H3VpQinmXOiDvx8d1CWcMKxB8CPU1RK0kgDiGA1ifCOEUGCEJ7KLTidlFqqVrfNQnj95t6ny-usEHWa2iH7w8_bRy934efSAp4_3k9HNFFsGTACm2hLGGHiiZMrTNMky1fRSwVymHFMeEpY6p2fWumxmmXNCKa8zKjWfKed4H121xTYu_WdchKKO5qPwaQjLaJrlf1eCxg5bG9dVXs59ZVpFidmeaqsNN403u4DZJi7bxLoK7xsfa7Mrdr6sK1uY8e0oYVpySf8hpQTFRNLIi1Y6G22Rl7lZhTLMK7teRCMFlcAV_wZa9XtI |
| ContentType | eBook Conference Proceeding |
| Copyright | Springer International Publishing Switzerland 2016 |
| Copyright_xml | – notice: Springer International Publishing Switzerland 2016 |
| DBID | I4C |
| DEWEY | 005 |
| DOI | 10.1007/978-3-319-45871-7 |
| DatabaseName | Casalini Torrossa eBooks Institutional Catalogue |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 331945871X 9783319458717 |
| EISSN | 1611-3349 |
| Edition | 1 1st Edition 2016 |
| Editor | Bishop, Matt Nascimento, Anderson C A |
| Editor_xml | – sequence: 1 fullname: Bishop, Matt – sequence: 2 fullname: Nascimento, Anderson C A |
| ExternalDocumentID | 9783319458717 418595 EBC6295351 EBC5578246 5415738 |
| GroupedDBID | 0D6 0DA 38. AABBV AAMCO AAPIT AAQZU ABBVZ ABMNI ABOWU ACLMJ ADCXD ADPGQ AEDXK AEJGN AEKFX AETDV AEZAY ALMA_UNASSIGNED_HOLDINGS AORVH AZZ BBABE CZZ I4C IEZ LDH NUC SAO SBO SWNTM TPJZQ TSXQS Z7R Z7S Z7U Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z87 Z88 AEJLV Z85 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ACGFS AEFIE EJD F5P FEDTE HVGLF LAS P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-a27247-19a02227e085b3bb6ff8203142cf8c28e762bcc9daacfda2cc488e9f1593d8cc3 |
| ISBN | 331945871X 9783319458717 3319458701 9783319458700 |
| ISSN | 0302-9743 |
| IngestDate | Fri Nov 08 04:08:36 EST 2024 Wed Sep 17 03:55:43 EDT 2025 Fri May 30 22:01:40 EDT 2025 Fri May 30 23:21:36 EDT 2025 Tue Nov 14 22:50:42 EST 2023 |
| IsPeerReviewed | true |
| IsScholarly | true |
| LCCallNum_Ident | Q |
| Language | English |
| LinkModel | OpenURL |
| MeetingName | International Conference on Information Security |
| MergedId | FETCHMERGED-LOGICAL-a27247-19a02227e085b3bb6ff8203142cf8c28e762bcc9daacfda2cc488e9f1593d8cc3 |
| OCLC | 957985774 1189772015 |
| PQID | EBC5578246 |
| PageCount | 457 |
| ParticipantIDs | askewsholts_vlebooks_9783319458717 springer_books_10_1007_978_3_319_45871_7 proquest_ebookcentral_EBC6295351 proquest_ebookcentral_EBC5578246 casalini_monographs_5415738 |
| PublicationCentury | 2000 |
| PublicationDate | 2016 2016-08-25 |
| PublicationDateYYYYMMDD | 2016-01-01 2016-08-25 |
| PublicationDate_xml | – year: 2016 text: 2016 |
| PublicationDecade | 2010 |
| PublicationPlace | Cham |
| PublicationPlace_xml | – name: Netherlands – name: Cham |
| PublicationSeriesSubtitle | Security and Cryptology |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSeriesTitleAlternate | Lect.Notes Computer |
| PublicationYear | 2016 |
| Publisher | Springer Nature Springer International Publishing AG Springer International Publishing Springer |
| Publisher_xml | – name: Springer Nature – name: Springer International Publishing AG – name: Springer International Publishing – name: Springer |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, United Kingdom – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, United Kingdom – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: CNB H 104.2, ETH Zurich, Zürich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Madras, Indian Institute of Technology, Chennai, India – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: Fakultät Informatik, TU Dortmund, Dortmund, Germany – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max Planck Institute for Informatics, Saarbrücken, Germany |
| SSID | ssj0001720365 ssj0002792 |
| Score | 2.3728054 |
| Snippet | This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September... |
| SourceID | askewsholts springer proquest casalini |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Computer programming, programs, data Computer Science Computer security-Congresses Computer Systems Organization and Communication Networks Computers and Society Cryptology Math Applications in Computer Science Systems and Data Security |
| Subtitle | 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings |
| TableOfContents | 4.1 Experimental Environment -- 4.2 Scalability -- 4.3 Resilience -- 4.4 Flexibility -- 5 Use Cases -- 5.1 Sharing Resources with Geographically Distributed Partners -- 5.2 Sharing Derived Information with Partners -- 6 Related Work -- 7 Conclusions -- References -- Privacy and Watermarking -- Leveraging Internet Services to Evade Censorship -- 1 Introduction -- 2 Threat Model -- 3 System Design -- 3.1 Abstract Architecture -- 3.2 Connector -- 3.3 Dispatcher -- 3.4 Plugins -- 4 Circumvention Systems -- 4.1 Email -- 4.2 VoIP and Instant Messaging -- 4.3 Online Gaming -- 4.4 File Sharing -- 5 Evaluation -- 5.1 Performance -- 5.2 Traffic Patterns -- 5.3 Real-World Deployment -- 6 Related Work -- 7 Conclusions -- References -- Analyzing Randomized Response Mechanisms Under Differential Privacy -- 1 Introduction -- 2 Background -- 2.1 Differential Privacy -- 2.2 Randomized Response Mechanisms -- 3 Analyzing the Randomized Response Mechanisms -- 4 Privacy Analysis -- 4.1 Analyzing the Variants -- 4.2 Analyzing Applications -- 5 Concluding Remarks -- References -- Models and Algorithms for Graph Watermarking -- 1 Introduction -- 2 Our Watermarking Framework -- 3 Identifying High- and Medium-Degree Vertices -- 4 Adversary Tolerance -- 5 Experiments -- References -- Software Security -- Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems -- 1 Introduction -- 2 Related Work -- 3 Scenario and Attacker Model -- 3.1 Data Integrity Protection and Attestation Scenario -- 3.2 Attacker Model -- 4 Microkernel-Based System Architecture with TPM 2.0 -- 5 Data Integrity Protection with Implicit Attestation -- 5.1 Notation -- 5.2 Cryptographic Keys -- 5.3 Phase 1: Setup -- 5.4 Phase 2: Data Integrity Protection with Implicit Attestation -- 6 Implementation -- 7 Security Discussion -- 8 Conclusion -- References Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method 2.2 Correlation Between SNR and Power Consumption of an Interesting Point -- 3 Our Methods to Bias Power Traces -- 3.1 Biasing Power Traces by Using Minkowski Distance -- 3.2 Biasing Power Traces by Using the Sum of Probability Density Function Values of Power Consumption of Interesting Points -- 3.3 Biasing Power Traces by Directly Using Power Consumption of Interesting Points -- 3.4 How to Bias Power Traces Using the Above 4 Schemes -- 4 Experimental Results -- 4.1 Interesting Points Extraction -- 4.2 Comparison of Screening Accuracy -- 4.3 Comparison of Success Rates -- 5 Conclusion -- References -- Damaging, Simplifying, and Salvaging p-OMD -- 1 Introduction -- 1.1 Nonce-Misuse Forgery on p-OMD (Damaging) -- 1.2 Spoed (Simplifying) -- 1.3 Spoednic (Salvaging) -- 2 Security Model -- 2.1 Authenticated Encryption -- 2.2 (Tweakable) Keyed Compression Function -- 3 p-OMD -- 3.1 Preliminary Security Claims of p-OMD -- 3.2 Nonce-Misusing Attack on p-OMD -- 4 Spoed -- 4.1 Syntax -- 4.2 Generalized Padding -- 4.3 Data Processing -- 4.4 Security of Spoed -- 5 Spoednic -- 5.1 Security of Spoednic -- 6 Security of Spoed (Theorem 2) -- 6.1 Security of Tweakable Keyed Compression Function -- 6.2 Proof of Theorem 2 -- 7 Security of Spoednic (Theorem 3) -- 7.1 Security of Tweakable Keyed Compression Function -- 7.2 Proof of Theorem 3 -- References -- Cryptographic Protocols -- Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols -- 1 Introduction -- 2 Preliminaries -- 2.1 Commitments -- 2.2 Zero Knowledge Proofs -- 3 Two-Server Blind Password Registration -- 3.1 Security Model for 2BPR Protocols -- 4 An Efficient Two-Server BPR Protocol -- 4.1 Protocol Overview -- 4.2 Two-Server BPR Specification -- 4.3 Security Analysis -- 5 Performance and Use with 2PAKE/2PASS Protocols -- 6 Conclusion -- References Intro -- Preface -- Organization -- Contents -- Cryptanalysis -- Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128 -- 1 Introduction -- 2 Specifications of Midori128 -- 2.1 Notations -- 2.2 Specifications -- 3 A 10-round Differential of Midori128 -- 4 13-round Truncated Differential Cryptanalysis of Midori128 -- 5 Multiple Differential Cryptanalysis of Midori128 -- 6 Conclusion -- References -- Improved Linear Cryptanalysis of Round-Reduced ARIA -- 1 Introduction -- 2 Specification of ARIA -- 2.1 Notations -- 3 Linear Cryptanalysis -- 4 Linear Cryptanalysis of ARIA -- 4.1 Key Recovery Attacks on ARIA -- 4.2 Recovering the Master Key -- 5 Conclusion -- References -- Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Organization -- 2 Preliminaries -- 3 Lattice Construction of the Takayasu-Kunihiro -- 4 Our Proposed Attack -- 4.1 An Observation of the Previous Lattice -- 4.2 Our Lattice Construction -- 5 Concluding Remarks -- References -- Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication -- 1 Introduction -- 2 Preliminary -- 2.1 NTRU Public Key Cryptosystem -- 3 Description of an NTRU-Based Group Key Agreement -- 3.1 An NTRU-Based Group Key Agreement -- 4 Attack on NTRU-Based Group Key Agreement -- 4.1 Ciphertext-Only Attack -- 4.2 Further Analysis -- 4.3 Experiment Results -- 5 An Improved NTRU-Based Group Key Agreement -- 5.1 The Improved Group Key Agreement -- 5.2 Security Analysis -- 6 Conclusion -- References -- Enhanced Correlation Power Analysis by Biasing Power Traces -- 1 Introduction -- 1.1 Related Works -- 1.2 Our Contributions -- 1.3 Organization -- 2 The Statistical Characteristics of Power Traces -- 2.1 Composition of Power Consumption Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2 -- 1 Introduction -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Assumptions and Cryptographic Primitives -- 2.3 Security Model -- 3 Generic Version of the Chip Authentication Mapping -- 4 Conclusion -- References -- AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Notation -- 2.2 ARM TrustZone -- 2.3 Physical Unclonable Functions -- 3 System Model and Assumptions -- 3.1 System Model -- 3.2 Assumptions and Threat Model -- 4 AEP-M Scheme for Mobile Devices -- 4.1 The Architecture of Trusted Mobile Device -- 4.2 Key Derivation and Sensitive Data Management -- 4.3 The Details of AEP-M Scheme -- 4.4 Optional Defense Mechanisms and Security Analysis -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Efficiency and Performance Evaluation -- 6 Conclusion -- References -- Universally Composable Two-Server PAKE -- 1 Introduction -- 2 Preliminaries and Building Blocks -- 2.1 Smooth Projective Hashing (SPHF) -- 2.2 Trapdoor Smooth Projective Hashing -- 2.3 Distributed Smooth Projective Hashing -- 2.4 Ideal Functionalities -- 3 Trapdoor Distributed Smooth Projective Hashing -- 3.1 Cramer-Shoup TD-SPHF -- 4 Universally Composable Two-Server PAKE -- 4.1 The Protocol -- 4.2 Ideal Functionality for 2PAKE -- 4.3 Security -- 5 F2PAKE Discussion -- 6 Conclusion -- References -- Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools -- 1 Introduction -- 1.1 Contribution -- 2 Related Work -- 3 Preliminaries -- 3.1 Bitcoin Mining and Block Withholding Attack -- 3.2 Notations and Terminologies -- 4 Analysis of BWH Attack -- 5 Proposed Remedy to BWH Attack -- 6 Conclusion -- References -- Network and Systems Security and Access Control Cyber Security Risk Assessment of a DDoS Attack -- 1 Introduction to InfoSec Risk Assessment -- 1.1 Distributed Denial of Service Attacks -- 1.2 Related Work in ISRA -- 2 Choice of Methods -- 2.1 Fundamentals of Risk Analysis -- 2.2 Proposed Methodology for Qualitative Risk Analysis -- 2.3 Methodology for Statistical Risk Analysis -- 3 Case Study: Qualitative Risk Assessment of a DDoS Attack -- 3.1 Events and Results -- 4 Quantitative Risk Analysis -- 4.1 Risk Calculations -- 4.2 Probabilistic Modeling for Risk Estimation -- 5 Discussion and Conclusion -- 5.1 Adjusting for Knowledge-Based Probability Estimations -- 5.2 Limitations and Future Work -- 5.3 Conclusion -- References -- Moving Target Defense Against Network Reconnaissance with Software Defined Networking -- 1 Introduction -- 2 Background -- 2.1 Moving Target Defense -- 2.2 Network Scan -- 2.3 Software-Defined Networking -- 3 System Architecture -- 3.1 Scan Sensor -- 3.2 Reflector -- 3.3 Shadow Network -- 4 Design and Implementation -- 4.1 Design Principles -- 4.2 Prototype Implementation -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control -- 1 Introduction -- 2 Background and Related Work -- 3 The Uni-ARBAC Model -- 3.1 Uni-ARBAC Operational Model -- 3.2 Uni-ARBAC Administrative Model -- 3.3 Uni-ARBAC Invariants -- 4 Variations of Uni-ARBAC -- 4.1 Aggressive Inheritance Model -- 4.2 No Self-administration Model -- 5 Engineering Administrative Units -- 6 Conclusion -- References -- SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing -- 1 Introduction -- 2 System Overview -- 2.1 Planner -- 2.2 Planner Themes -- 2.3 Service -- 2.4 Transport -- 3 System Wide Aspects -- 3.1 Quality of Service -- 3.2 Access Control Layer -- 4 Evaluation |
| Title | Information Security |
| URI | http://digital.casalini.it/9783319458717 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5578246 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6295351 http://link.springer.com/10.1007/978-3-319-45871-7 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319458717 |
| Volume | 9866 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT9swFLcGu8AFGJ1WvhRNHCahTDiOvw4coOqEqoJ2gKo3y3Hsy6YikcCBv57nOG7SDqFtlyiKkvTl_fq-_PzeQ-hUWCKYyEjqe12lecldKhm1qSBacoe5KwofKN7csuv7fDKn866svakuqYvv5uXNupL_QRWuAa6-SvYfkF2-FC7AOeALR0AYjmvO75t2pi0lamU-zKELWsJ3L64upm1-4PahbrZdncURDlGi-yE_Xg_545Lf2qJht261EiMSELKcglie91QLAT0IkURQLTaoPuYbGpLQQDTqRinCTJQ_FG1_b4Wvg_K_gFPeWZXlXj_fHUfSDbTBOWidj5fjyXTWrYL5LDDrAhbfzjDkfQJ9vhon0o9Dv6Tue2KSuu0TvELINtrW1S-wE2BD6so7HbrSvtZ0JZJYS343PsXdLhp01ZbJzyW-e-iDXXxCOxGrpMVqH-338E4i3gM0-zG-G12n7VCLVGc8y3mKpW4KkC04uwUpCuYceGEE55lxwmTCgnkqjJGl1saVOjMGdKyVDvxOUgpjyGe0uXhY2C8oYecOoo5M0mZqDHVa4lKCT22toAbiyiH62mOCev7dJOAr1eMi5kN0GHmjQD5Co_RKUfDsOIFXJJFdqnm63TOsxlcj6kch5Oy9WxgQRygeom-R0yqQELtlAymKKCBGNdQofvD3tx6irU46jtBm_fhkj8FFrIuT9n_2CjECWRI |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Information+Security&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2016-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319458700&rft.issn=0302-9743&rft.eissn=1611-3349&rft.volume=9866&rft_id=info:doi/10.1007%2F978-3-319-45871-7&rft.externalDocID=418595 |
| thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833194%2F9783319458717.jpg |
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-319-45871-7 |