Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings / [electronic resource] : edited by Robert H. Deng, Tao Feng. - Berlin, Heidelberg : Springer Berlin Heidelberg, 2013. - 1 online resource (XIV, 388 p. 72 ill.) - Lecture Notes in Computer Science, 7863 0302-9743 ; .

Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection -- Trusted Identity Management for Overlay Networks -- Situational Awareness for Improving Network Resilience Management -- Optimal Defense Strategies for DDoS defender using Bayesian Game Model -- Identity-Based Cryptography -- Attribute Specified Identity-Based Encryption -- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions -- Identity-based Multisignature with Message Recovery -- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme -- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures -- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release -- About Hash into Montgomery Form Elliptic Curves -- Secure RFID Ownership Transfer Protocols -- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model -- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control -- Cryptanalysis of the OKH Authenticated Encryption Scheme.

9783642380334


Computer science.
Computer security.
Data encryption (Computer science).
Management information systems.