Information Security

10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings

Omschrijving

This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007. The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases. The 10th Information Security Conference (ISC 2007) was held in Valparä ?so, Chile, October 9¿12, 2007. ISC is an annual international conference covering research in theory and applications of information security, aiming to attract high quality papers in all of its technical aspects. ISC was ?rst initiated as a workshop (ISW) in Japan in 1997, ISW 1999 was held in Malaysia and ISW 2000 in Australia. The name was changed to the current one when the conf- ence was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), the UK (ISC 2003), the USA (ISC 2004), Singapore (ISC 2005),and Greece (ISC 2006). This year the event wassponsored by the Univ- sidad T¿ ecnica Federico Santa Mar¿ ?a (Valparä ?so, Chile), the Support Center for AdvancedTelecommunicationsTechnologyResearch,Foundation,SCAT(Tokyo, Japan), Microsoft Corporation, and Yahoo! Research. Re?ectingtheconference¿sbroadscope,thisyear¿smainProgramCommittee consisted of a relatively large number (49) of experts. Additionally, given the timely topic of cryptanalysis and design of hash functions and the NIST hash competition, the conference also featured a special Hash Subcommittee, chaired by Arjen Lenstra (EPFL and Bell Labs), as well as a panel on hashing, chaired by Bill Burr (NIST). The conference received 116 submissions, 29 of which were selected by the committee members for presentation at the conference, based on quality, originality and relevance. Each paper was anonymously reviewed by at least three committee members. Intrusion Detection Detecting System Emulators 1(18) Thomas Raffetseder Christopher Kruegel Engin Kirda Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems 19(18) Iosif-Viorel Onut Ali A. Ghorbani E-NIPS: An Event-Based Network Intrusion Prediction System 37(16) Pradeep Kannadiga Mohammad Zulkernine Anwar Haque Digital Rights Management Enabling Fairer Digital Rights Management with Trusted Computing 53(18) Ahmad-Reza Sadeghi Marko Wolf Christian Stuble N. Asokan Jan-Erik Ekberg Traitor Tracing with Optimal Transmission Rate 71(18) Nelly Fazio Antonio Nicolosi Duong Hieu Phan Symmetric-Key Cryptography The Security of Elastic Block Ciphers Against Key-Recovery Attacks 89(15) Debra L. Cook Moti Yung Angelos D. Keromytis Impossible-Differential Attacks on Large-Block Rijndael 104(14) Jorge Nakahara Jr. Ivan Carlos Pavao High-Speed Pipelined Hardware Architecture for Galois Counter Mode 118(12) Akashi Satoh Takeshi Sugawara Takafumi Aoki Cryptographic Protocols and Schemes Efficient Committed Oblivious Transfer of Bit Strings 130(15) Mehmet S. Kiraz Berry Schoenmakers Jose Villegas An Efficient Certified Email Protocol 145(13) Jim Shao Min Feng Bin Zhu Zhenfu Cao Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability 158(17) Alexander W. Dent Qiang Tang On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures: How to Prove the Possession of an ElGamal/DSA Signature 175(14) Fabien Laguillaumie Damien Vergnaud Identify-Based Cryptography Identity-Based Proxy Re-encryption Without Random Oracles 189(14) Cheng-Kang Chu Wen-Guey Tzeng Strongly-Secure Identity-Based Key Agreement and Anonymous Extension 203(18) Sherman S.M. Chow Kim-Kwang Raymond Choo Cryptanalysis Small Private-Exponent Attack on RSA with Primes Sharing Bits 221(9) Yao-Dong Zhao Wen-Feng Qi Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 230(19) Joo Yeon Cho Josef Pieprzyk New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py 249(14) Gautham Sekar Souradyuti Paul Bart Preneel Network Security Queue Management, as a DoS Counter-Measure? 263(18) Daniel Boteanu Jose M. Fernandez John Me Hugh John Mullins Software Obfuscation On the Concept of Software Obfuscation in Computer Security 281(18) Nikolay Kuzurin Alexander Shokurov Nikolay Varnovsky Vladimir Zakharov Specifying Imperative Data Obfuscations 299(16) Stephen Drape Clark Thomborson Anirban Majumdar Public-Key Cryptosystems Token-Controlled Public Key Encryption in the Standard Model 315(18) Sherman S.M. Chow Trapdoor Permutation Polynomials of Z/nZ and Public Key Cryptosystems 333(18) Guilhem Castagnos Damien Vergnaud A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring 351(11) Yvo Desmedt Kaoru Kurosawa Towards a DL-Based Additively Homomorphic Encryption Scheme 362(14) Guilhem Castagnos Benoit Chevallier-Mames Elliptic Curves and Applications Differential Properties of Elliptic Curves and Blind Signatures 376(14) Billy Bob Brumley Kaisa Nyberg Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation 390(17) Pradeep Kumar Mishra Vassil Dimitrov Database Security and Privacy Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control 407(16) Joachim Biskup Jan-Hendrik Lochner Efficient Negative Databases from Cryptographic Hash Functions 423(14) George Danezis Claudia Diaz Sebastian Faust Emilia Kasper Carmela Troncoso Bart Preneel Author Index 437
€ 61,20
Paperback
 
Gratis verzending vanaf
€ 19,95 binnen Nederland
Schrijver
Titel
Information Security
Uitgever
Springer-Verlag GmbH
Jaar
2007
Taal
Engels
Pagina's
456
Gewicht
680 gr
EAN
9783540754954
Afmetingen
229 x 152 x 25 mm
Bindwijze
Paperback

U ontvangt bij ons altijd de laatste druk!


Rubrieken

Boekstra