Information Security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings /
The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security....
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2004.
|
Edition: | 1st ed. 2004. |
Series: | Lecture Notes in Computer Science,
3225 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Key Management
- Practical Authenticated Key Agreement Using Passwords
- Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks
- Storage-Efficient Stateless Group Key Revocation
- Digital Signatures
- Low-Level Ideal Signatures and General Integrity Idealization
- Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA
- How to Break and Repair a Universally Composable Signature Functionality
- New Algorithms
- RSA Accumulator Based Broadcast Encryption
- Chameleon Hashing Without Key Exposure
- Radix-r Non-Adjacent Form
- Cryptanalysis
- On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor
- Security Analysis of Two Signcryption Schemes
- On The Security of Key Derivation Functions
- Intrusion Detection
- Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery
- A Model for the Semantics of Attack Signatures in Misuse Detection Systems
- Detection of Sniffers in an Ethernet Network
- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
- Securing DBMS: Characterizing and Detecting Query Floods
- Access Control
- An XML-Based Approach to Document Flow Verification
- Model-Checking Access Control Policies
- A Distributed High Assurance Reference Monitor
- Using Mediated Identity-Based Cryptography to Support Role-Based Access Control
- Human Authentication
- Towards Human Interactive Proofs in the Text-Domain
- Image Recognition CAPTCHAs
- Certificate Management
- A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
- Certificate Recommendations to Improve the Robustness of Web of Trust
- Mobile and Ad Hoc Security
- Universally Composable Secure Mobile Agent Computation
- Re-thinking Security in IP Based Micro-Mobility
- Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group
- Web Security
- Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions
- Provable Unlinkability Against Traffic Analysis Already After Steps!
- An Efficient Online Electronic Cash with Unlinkable Exact Payments
- Digital Rights Management
- Modifiable Digital Content Protection in P2P
- Survey on the Technological Aspects of Digital Rights Management
- Detecting Software Theft via Whole Program Path Birthmarks
- Software Security
- Effective Security Requirements Analysis: HAZOP and Use Cases
- The Obfuscation Executive.