Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedings /
th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 – September 2, 2006. The Conference was organized by the University of the Aegean, Greece. ISC was first initiated as a workshop, ISW in Japan in 1997, ISW...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4176 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Software Security
- Extending .NET Security to Unmanaged Code
- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation
- Privacy and Anonymity
- Low Latency Anonymity with Mix Rings
- Breaking Four Mix-Related Schemes Based on Universal Re-encryption
- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy
- Protecting Data Privacy Through Hard-to-Reverse Negative Databases
- Block Ciphers and Hash Functions
- Related-Key Rectangle Attack on 42-Round SHACAL-2
- On the Collision Resistance of RIPEMD-160
- Digital Signatures
- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption
- Multi-party Concurrent Signatures
- Formal Security Model of Multisignatures
- Cryptanalysis of Variants of UOV
- Stream Ciphers
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Encryption I
- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice
- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
- Collusion-Free Policy-Based Encryption
- Pervasive Computing
- Using Multiple Smart Cards for Signing Messages at Malicious Terminals
- Diverging Keys in Wireless Sensor Networks
- Encryption II
- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
- Transparent Image Encryption Using Progressive JPEG
- Network Security
- Preserving TCP Connections Across Host Address Changes
- A Security Architecture for Protecting LAN Interactions
- Simulation of Internet DDoS Attacks and Defense
- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr
- Watermarking and DRM
- Rights Protection for Data Cubes
- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM)
- Intrusion Detection and Worms
- Resistance Analysis to Intruders’ Evasion of Detecting Intrusion
- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks
- Anomaly Intrusion Detection Based on Clustering a Data Stream
- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation
- Key Exchange
- An Authentication and Key Exchange Protocol for Secure Credential Services
- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
- Security Protocols and Formal Methods
- Formalising Receipt-Freeness
- Enhancing the Security and Efficiency of 3-D Secure
- Designing and Verifying Core Protocols for Location Privacy
- Information Systems Security
- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches
- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness.