Applied Cryptography and Network Security

10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings

  • Feng Bao
  • Pierangela Samarati
  • Jianying Zhou

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7341)

Table of contents

  1. Front Matter
  2. Authentication

    1. Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
      Pages 12-29
    2. Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung
      Pages 30-47
  3. Key Management

    1. Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao
      Pages 48-65
    2. Tilo Müller, Benjamin Taubmann, Felix C. Freiling
      Pages 66-83
  4. Block Ciphers

  5. Identity-Based Cryptography

    1. Atsushi Fujioka, Taiichi Saito, Keita Xagawa
      Pages 135-152
    2. Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
      Pages 153-170
  6. Cryptographic Primitives

    1. Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer
      Pages 171-187
    2. Xiang Xie, Rui Xue, Rui Zhang
      Pages 188-205
  7. Cryptanalysis

    1. Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li
      Pages 241-256
    2. Yuki Asano, Shingo Yanagihara, Tetsu Iwata
      Pages 257-274
  8. Side Channel Attacks

    1. Fangguo Zhang, Qiping Lin, Shengli Liu
      Pages 293-310
    2. Gilles Piret, Thomas Roche, Claude Carlet
      Pages 311-328

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012.

The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.

Keywords

authentication cloud computing data structures protocols spam detection

Editors and affiliations

  • Feng Bao
    • 1
  • Pierangela Samarati
    • 2
  • Jianying Zhou
    • 1
  1. 1.Institute for Infocomm ResearchSingaporeSingapore
  2. 2.Dipartimento di Tecnologie dell’ InformazioneUniversità degli Studi di MilanoCrema (CR)Italy

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-31284-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-31283-0
  • Online ISBN 978-3-642-31284-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace