Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings /

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to fo...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Zhou, Jianying (Επιμελητής έκδοσης), Lopez, Javier (Επιμελητής έκδοσης), Deng, Robert H. (Επιμελητής έκδοσης), Bao, Feng (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3650
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Network Security I
  • A Dynamic Mechanism for Recovering from Buffer Overflow Attacks
  • SVision: A Network Host-Centered Anomaly Visualization Technique
  • Trust & Privacy
  • Time-Based Release of Confidential Information in Hierarchical Settings
  • “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience
  • A Privacy Preserving Rental System
  • Key Management & Protocols
  • Constant Round Dynamic Group Key Agreement
  • A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design
  • ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms
  • On the Notion of Statistical Security in Simulatability Definitions
  • Public Key Encryption & Signature
  • Certificateless Public Key Encryption Without Pairing
  • Tracing-by-Linking Group Signatures
  • Chaum’s Designated Confirmer Signature Revisited
  • Network Security II
  • gore: Routing-Assisted Defense Against DDoS Attacks
  • IPSec Support in NAT-PT Scenario for IPv6 Transition
  • Signcryption
  • Hybrid Signcryption Schemes with Outsider Security
  • Analysis and Improvement of a Signcryption Scheme with Key Privacy
  • Efficient and Proactive Threshold Signcryption
  • Crypto Algorithm & Analysis
  • Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
  • Hardware Architecture and Cost Estimates for Breaking SHA-1
  • On the Security of Tweakable Modes of Operation: TBC and TAE
  • A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm
  • Cryptography
  • Compatible Ideal Contrast Visual Cryptography Schemes with Reversing
  • An Oblivious Transfer Protocol with Log-Squared Communication
  • Applications
  • Electronic Voting: Starting Over?
  • Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System
  • Universally Composable Time-Stamping Schemes with Audit
  • A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption
  • Software Security
  • Building a Cryptovirus Using Microsoft’s Cryptographic API
  • On the Security of the WinRAR Encryption Method
  • Towards Better Software Tamper Resistance
  • Authorization & Access Control
  • Device-Enabled Authorization in the Grey System
  • Evaluating Access Control Policies Through Model Checking
  • A Cryptographic Solution for General Access Control
  • Student Papers
  • Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting
  • A Formal Definition for Trust in Distributed Systems
  • A Practical Voting Scheme with Receipts
  • New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
  • Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.