Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings /
ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop was our ?rst trial in that two major academic society groups on security in Japan, viz. ISEC and CSEC,...
| Corporate Author: | |
|---|---|
| Other Authors: | , , , , |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
| Series: | Lecture Notes in Computer Science,
4266 |
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Signatures (1)
- ID-Based Ring Signature Scheme Secure in the Standard Model
- A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability
- Sound Computational Interpretation of Symbolic Hashes in the Standard Model
- Security Evaluation
- A Requirement Centric Framework for Information Security Evaluation
- A Model-Based Method for Security Configuration Verification
- Personal Computer Privacy: Analysis for Korean PC Users
- Signatures (2)
- Short Traceable Signatures Based on Bilinear Pairings
- Ring Signature with Designated Linkability
- Ad Hoc Group Signatures
- Rateless Codes for the Multicast Stream Authentication Problem
- Authentication
- Crossing Borders: Security and Privacy Issues of the European e-Passport
- A New Approach to Hide Policy for Automated Trust Negotiation
- Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing
- IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures
- Security for Multimedia
- A Study of Detection Method of Printed Image Alteration Using Digital Watermark
- Real-Time Watermark Embedding for High Resolution Video Watermarking
- Inhibiting Card Sharing Attacks
- Network Security
- A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction
- Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks
- Modeling of Network Intrusions Based on the Multiple Transition Probability
- Encryption and Key Exchange
- Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition
- Ciphertext-Auditable Public Key Encryption
- Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
- Cryptanalysis and Implementation
- On the Effectiveness of TMTO and Exhaustive Search Attacks
- Low Power AES Hardware Architecture for Radio Frequency Identification
- The High-Speed Packet Cipher System Suitable for Small Sized Data
- Access Control
- A Tool for Managing Security Policies in Organisations
- Information Flow Query and Verification for Security Policy of Security-Enhanced Linux
- The Complexity of Discretionary Access Control
- Traceroute Based IP Channel for Sending Hidden Short Messages.