Skip to main content
Book cover

Applied Cryptography and Network Security

13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers

  • Conference proceedings
  • © 2015

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9092)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ACNS 2015.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (33 papers)

  1. Secure Computation I: Primitives and New Models

  2. Public Key Cryptographic Primitives

  3. Secure Computation II: Applications

  4. Anonymity and Related Applications

Other volumes

  1. Applied Cryptography and Network Security

Keywords

About this book

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Editors and Affiliations

  • Columbia University, New York, USA

    Tal Malkin, Allison Bishop Lewko

  • Bell Labs, Murray Hill, USA

    Vladimir Kolesnikov

  • Stony Brook University, Stony Brook, USA

    Michalis Polychronakis

Bibliographic Information

Publish with us