Omschrijving
This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007.
The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases. The 10th Information Security Conference (ISC 2007) was held in Valparä ?so, Chile, October 9¿12, 2007. ISC is an annual international conference covering research in theory and applications of information security, aiming to attract high quality papers in all of its technical aspects. ISC was ?rst initiated as a workshop (ISW) in Japan in 1997, ISW 1999 was held in Malaysia and ISW 2000 in Australia. The name was changed to the current one when the conf- ence was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), the UK (ISC 2003), the USA (ISC 2004), Singapore (ISC 2005),and Greece (ISC 2006). This year the event wassponsored by the Univ- sidad T¿ ecnica Federico Santa Mar¿ ?a (Valparä ?so, Chile), the Support Center for AdvancedTelecommunicationsTechnologyResearch,Foundation,SCAT(Tokyo, Japan), Microsoft Corporation, and Yahoo! Research. Re?ectingtheconference¿sbroadscope,thisyear¿smainProgramCommittee consisted of a relatively large number (49) of experts. Additionally, given the timely topic of cryptanalysis and design of hash functions and the NIST hash competition, the conference also featured a special Hash Subcommittee, chaired by Arjen Lenstra (EPFL and Bell Labs), as well as a panel on hashing, chaired by Bill Burr (NIST). The conference received 116 submissions, 29 of which were selected by the committee members for presentation at the conference, based on quality, originality and relevance. Each paper was anonymously reviewed by at least three committee members. Intrusion Detection
Detecting System Emulators
1(18)
Thomas Raffetseder
Christopher Kruegel
Engin Kirda
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems
19(18)
Iosif-Viorel Onut
Ali A. Ghorbani
E-NIPS: An Event-Based Network Intrusion Prediction System
37(16)
Pradeep Kannadiga
Mohammad Zulkernine
Anwar Haque
Digital Rights Management
Enabling Fairer Digital Rights Management with Trusted Computing
53(18)
Ahmad-Reza Sadeghi
Marko Wolf
Christian Stuble
N. Asokan
Jan-Erik Ekberg
Traitor Tracing with Optimal Transmission Rate
71(18)
Nelly Fazio
Antonio Nicolosi
Duong Hieu Phan
Symmetric-Key Cryptography
The Security of Elastic Block Ciphers Against Key-Recovery Attacks
89(15)
Debra L. Cook
Moti Yung
Angelos D. Keromytis
Impossible-Differential Attacks on Large-Block Rijndael
104(14)
Jorge Nakahara Jr.
Ivan Carlos Pavao
High-Speed Pipelined Hardware Architecture for Galois Counter Mode
118(12)
Akashi Satoh
Takeshi Sugawara
Takafumi Aoki
Cryptographic Protocols and Schemes
Efficient Committed Oblivious Transfer of Bit Strings
130(15)
Mehmet S. Kiraz
Berry Schoenmakers
Jose Villegas
An Efficient Certified Email Protocol
145(13)
Jim Shao
Min Feng
Bin Zhu
Zhenfu Cao
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
158(17)
Alexander W. Dent
Qiang Tang
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures: How to Prove the Possession of an ElGamal/DSA Signature
175(14)
Fabien Laguillaumie
Damien Vergnaud
Identify-Based Cryptography
Identity-Based Proxy Re-encryption Without Random Oracles
189(14)
Cheng-Kang Chu
Wen-Guey Tzeng
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
203(18)
Sherman S.M. Chow
Kim-Kwang Raymond Choo
Cryptanalysis
Small Private-Exponent Attack on RSA with Primes Sharing Bits
221(9)
Yao-Dong Zhao
Wen-Feng Qi
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
230(19)
Joo Yeon Cho
Josef Pieprzyk
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
249(14)
Gautham Sekar
Souradyuti Paul
Bart Preneel
Network Security
Queue Management, as a DoS Counter-Measure?
263(18)
Daniel Boteanu
Jose M. Fernandez
John Me Hugh
John Mullins
Software Obfuscation
On the Concept of Software Obfuscation in Computer Security
281(18)
Nikolay Kuzurin
Alexander Shokurov
Nikolay Varnovsky
Vladimir Zakharov
Specifying Imperative Data Obfuscations
299(16)
Stephen Drape
Clark Thomborson
Anirban Majumdar
Public-Key Cryptosystems
Token-Controlled Public Key Encryption in the Standard Model
315(18)
Sherman S.M. Chow
Trapdoor Permutation Polynomials of Z/nZ and Public Key Cryptosystems
333(18)
Guilhem Castagnos
Damien Vergnaud
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring
351(11)
Yvo Desmedt
Kaoru Kurosawa
Towards a DL-Based Additively Homomorphic Encryption Scheme
362(14)
Guilhem Castagnos
Benoit Chevallier-Mames
Elliptic Curves and Applications
Differential Properties of Elliptic Curves and Blind Signatures
376(14)
Billy Bob Brumley
Kaisa Nyberg
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
390(17)
Pradeep Kumar Mishra
Vassil Dimitrov
Database Security and Privacy
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control
407(16)
Joachim Biskup
Jan-Hendrik Lochner
Efficient Negative Databases from Cryptographic Hash Functions
423(14)
George Danezis
Claudia Diaz
Sebastian Faust
Emilia Kasper
Carmela Troncoso
Bart Preneel
Author Index
437