Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan /
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US,
2005.
|
Σειρά: | IFIP Advances in Information and Communication Technology,
181 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Regular Papers
- Accountable Anonymous E-Mail
- Protecting Consumer Data in Composite Web Services
- A Decision Matrix Approach
- Assignment of Security Clearances in an Organization
- Tool Supported Management of Information Security Culture
- ERPSEC - A Reference Framework to Enhance Security in ERP Systems
- A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises
- A Secure Quantum Communication Protocol Using Insecure Public Channels
- Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems
- Design and Implementation of TPM SUP320
- Mathematical Models of IP Traceback Methods and Their Verification
- Transferable E-Cash Revisit
- A License Transfer System for Supporting Content Portability in Digital Rights Management
- Secure Human Communications Based on Biometrics Signals
- Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks
- An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN
- The Pairing Problem with User Interaction
- Network Smart Card
- Protection Against Spam Using Pre-Challenges
- Automatically Hardening Web Applications Using Precise Tainting
- Traffic Redirection Attack Protection System (TRAPS)
- Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks
- Design, Implementation, and Evaluation of Fritrace
- Design and Implementation of a High-Performance Network Intrusion Prevention System
- STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis
- Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection
- Designated-Verifier Proxy Signature Schemes
- Tripartite Concurrent Signatures
- Signcryption in Hierarchical Identity Based Cryptosystem
- Protecting Group Dynamic Information in Large Scale Multicast Groups
- Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks
- Ensuring Media Integrity on Third-Party Infrastructures
- A New Fragile Mesh Watermarking Algorithm for Authentication
- New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images
- Workshop Papers
- Overcoming Channel Bandwidth Constraints in Secure SIM Applications
- On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation
- On-the-Fly Formal Testing of a Smart Card Applet
- A Computationally Feasible SPA Attack on AES VIA Optimized Search
- The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations
- Streamto: Streaming Content Using a Tamper-Resistant Token.