Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings /
This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008. The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2008.
|
Σειρά: | Lecture Notes in Computer Science,
5222 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Trusted Computing
- Property-Based TPM Virtualization
- A Demonstrative Ad Hoc Attestation System
- Property-Based Attestation without a Trusted Third Party
- The Reduced Address Space (RAS) for Application Memory Authentication
- Database and System Security
- An Efficient PIR Construction Using Trusted Hardware
- Athos: Efficient Authentication of Outsourced File Systems
- BotTracer: Execution-Based Bot-Like Malware Detection
- Intrusion Detection
- Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets
- Distinguishing between FE and DDoS Using Randomness Check
- Network Security
- Antisocial Networks: Turning a Social Network into a Botnet
- Compromising Anonymity Using Packet Spinning
- Behavior-Based Network Access Control: A Proof-of-Concept
- Path-Based Access Control for Enterprise Networks
- Cryptanalysis
- Cryptanalysis of Rabbit
- Algebraic Attack on HFE Revisited
- Revisiting Wiener’s Attack – New Weak Keys in RSA
- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
- Digital Signatures
- Proxy Re-signatures in the Standard Model
- An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner
- Certificate-Based Signature Schemes without Pairings or Random Oracles
- AES Special Session
- Improved Impossible Differential Attacks on Large-Block Rijndael
- A Five-Round Algebraic Property of the Advanced Encryption Standard
- Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication
- Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip
- Symmetric Cryptography and Hash Functions
- Collisions for RC4-Hash
- New Applications of Differential Bounds of the SDS Structure
- Authentication
- HAPADEP: Human-Assisted Pure Audio Device Pairing
- One-Time Password Access to Any Server without Changing the Server
- Can “Something You Know” Be Saved?
- Security Protocols
- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
- A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
- Strong Accumulators from Collision-Resistant Hashing
- A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.