Information Security and Cryptology - ICISC 2014

Information Security and Cryptology - ICISC 2014

4.11 - 1251 ratings - Source

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.[3] proposes DNADroid, which uses Program Dependence Graph(PDG) to determine code similarity. ... Normalized Compression Distance (NCD) to analyze the similarity and differences between two Android applications. Similarly ... researchers have proposed different ways of detecting repackaged applications by measuring the source code similarity or software watermarking. ... We analyze these camouflaged applications, discuss their behaviors and calculate the false alarm rates.

Title:Information Security and Cryptology - ICISC 2014
Author:Jooyoung Lee, Jongsung Kim
Publisher:Springer - 2015-03-16


You Must CONTINUE and create a free account to access unlimited downloads & streaming