DocumentCode :
3289568
Title :
Table of contents
fYear :
2012
fDate :
9-10 Aug. 2012
Abstract :
The following topics are dealt with: information security; reversible data hiding; lossless data hiding scheme; strong tamper-localization visual secret sharing scheme; renegotiation vulnerability; short RSA key length problem; secure WEP operation; security patch lifecycle analysis; secure password synthesis; remote user authenticated key agreement protocol; PDAF; proactive distributed authentication framework; fast-refreshing tree-based group key agreement; smart card based authentication; DroidMat; Android malware detection; malware download; cloud data integrity proof techniques; and attack sequence detection.
Keywords :
authorisation; cloud computing; cryptographic protocols; data encapsulation; data integrity; invasive software; message authentication; mobile computing; public key cryptography; Android malware detection; DroidMat; PDAF; attack sequence detection; cloud data integrity proof techniques; fast-refreshing tree-based group key agreement; information security; lossless data hiding scheme; malware download; proactive distributed authentication framework; remote user authenticated key agreement protocol; renegotiation vulnerability; reversible data hiding; secure WEP operation; secure password synthesis; security patch lifecycle analysis; short RSA key length problem; smart card based authentication; strong tamper-localization visual secret sharing scheme;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on
Conference_Location :
Tokyo
Print_ISBN :
978-1-4673-2261-4
Electronic_ISBN :
978-0-7695-4776-3
Type :
conf
DOI :
10.1109/AsiaJCIS.2012.4
Filename :
6298124
Link To Document :
بازگشت