Title :
Table of contents
Abstract :
The following topics are dealt with: information security; reversible data hiding; lossless data hiding scheme; strong tamper-localization visual secret sharing scheme; renegotiation vulnerability; short RSA key length problem; secure WEP operation; security patch lifecycle analysis; secure password synthesis; remote user authenticated key agreement protocol; PDAF; proactive distributed authentication framework; fast-refreshing tree-based group key agreement; smart card based authentication; DroidMat; Android malware detection; malware download; cloud data integrity proof techniques; and attack sequence detection.
Keywords :
authorisation; cloud computing; cryptographic protocols; data encapsulation; data integrity; invasive software; message authentication; mobile computing; public key cryptography; Android malware detection; DroidMat; PDAF; attack sequence detection; cloud data integrity proof techniques; fast-refreshing tree-based group key agreement; information security; lossless data hiding scheme; malware download; proactive distributed authentication framework; remote user authenticated key agreement protocol; renegotiation vulnerability; reversible data hiding; secure WEP operation; secure password synthesis; security patch lifecycle analysis; short RSA key length problem; smart card based authentication; strong tamper-localization visual secret sharing scheme;
Conference_Titel :
Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on
Conference_Location :
Tokyo
Print_ISBN :
978-1-4673-2261-4
Electronic_ISBN :
978-0-7695-4776-3
DOI :
10.1109/AsiaJCIS.2012.4