By Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie (auth.), Xuejia Lai, Jianying Zhou, Hui Li (eds.)

This booklet constitutes the refereed complaints of the 14th overseas convention on info safety, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised complete papers have been rigorously reviewed and chosen from ninety five submissions. The papers are equipped in topical sections on assaults; protocols; public-key cryptosystems; community safety; software program defense; method safety; database safety; privateness; electronic signatures.

Show description

Read Online or Download Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings PDF

Similar international books

Mobile Information Systems II: IFIP International Working Conference on Mobile Information Systems, MOBIS 2005, Leeds, UK, December 6-7, 2005 (IFIP International Federation for Information Processing)

Cellular details structures II presents a set of study at the making plans, research, layout, building, amendment, implementation, usage, review, and administration of cellular info structures. The articles specialise in the consequences of this study on the earth of trade, and tackle technical matters and constraints on cellular details structures functionalities and layout.

International Assessment of Research and Development in Simulation-Based Engineering and Science

Simulation-Based Engineering and technology (Sbe&S) cuts throughout disciplines, exhibiting great promise in parts from hurricane prediction and weather modeling to knowing the mind and the habit of diverse different complicated platforms. during this groundbreaking quantity, 9 amazing leaders verify the newest learn tendencies, because of fifty two web site visits in Europe and Asia and thousands of hours of professional interviews, and speak about the results in their findings for the U.S. executive.

Interactive Theorem Proving: First International Conference, ITP 2010, Edinburgh, UK, July 11-14, 2010. Proceedings

This ebook constitutes the refereed lawsuits of the 1st overseas convention on Interactive Theorem proving, ITP 2010, held in Edinburgh, united kingdom, in July 2010. The 33 revised complete papers provided have been rigorously reviewed and chosen from seventy four submissions. The papers are geared up in subject matters corresponding to counterexample new release, hybrid procedure verification, translations from one formalism to a different, and cooperation among instruments.

Additional resources for Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings

Sample text

LNCS, vol. 3495, pp. 454–458. Springer, Heidelberg (2005) 27. : Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. IEEE Transactions on Software Engineering, 735–746 (2002) 28. : Tamper Resistant Software: An Implementation. In: Anderson, R. ) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996) 29. : The Evolution of System-Call Monitoring. In: Proceedings of the 2008 Annual Computer Security Applications Conference (ACSAC 2008), pp. 418–430. IEEE Computer Society, Washington, DC, USA (2008) 30.

For the sake of ease of presentation we assume a traitor coalition of size at least 2 with t2 − t1 − 1 = α for a suitably large α (we make this explicit below). The correctness of the theorem, again similar to the case for history-recording 2 decoder, relies on the tracing algorithm TraceHC that queries λ = 75n ·ln(8/ε) σ transmissions for each type of coloring. We recall that the hybrid coloring tracing algorithm was believed to be successful by [19,21] and the latter work proposed a Attacking Traitor Tracing Schemes 29 Input : Given a ciphertext c ∈ Cext Parameters : Traitor identities T = {t1 , .

IEEE Transactions on Information Theory 44(5), 1897–1905 (1998) 4. : Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In: Vaudenay, S. ) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573–592. Springer, Heidelberg (2006) 5. : A fully collusion resistant broadcast, trace, and revoke system. In: ACM Conference on Computer and Communications Security 2006, pp. 211–220 (2006) 6. : Tracing Traitors. G. ) CRYPTO 1994. LNCS, vol. 839, pp. 257–270. Springer, Heidelberg (1994) 7.

Download PDF sample

Rated 4.79 of 5 – based on 6 votes