Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings /

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008. The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Wu, Tzong-Chen (Επιμελητής έκδοσης), Lei, Chin-Laung (Επιμελητής έκδοσης), Rijmen, Vincent (Επιμελητής έκδοσης), Lee, Der-Tsai (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008.
Σειρά:Lecture Notes in Computer Science, 5222
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Trusted Computing
  • Property-Based TPM Virtualization
  • A Demonstrative Ad Hoc Attestation System
  • Property-Based Attestation without a Trusted Third Party
  • The Reduced Address Space (RAS) for Application Memory Authentication
  • Database and System Security
  • An Efficient PIR Construction Using Trusted Hardware
  • Athos: Efficient Authentication of Outsourced File Systems
  • BotTracer: Execution-Based Bot-Like Malware Detection
  • Intrusion Detection
  • Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets
  • Distinguishing between FE and DDoS Using Randomness Check
  • Network Security
  • Antisocial Networks: Turning a Social Network into a Botnet
  • Compromising Anonymity Using Packet Spinning
  • Behavior-Based Network Access Control: A Proof-of-Concept
  • Path-Based Access Control for Enterprise Networks
  • Cryptanalysis
  • Cryptanalysis of Rabbit
  • Algebraic Attack on HFE Revisited
  • Revisiting Wiener’s Attack – New Weak Keys in RSA
  • Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
  • Digital Signatures
  • Proxy Re-signatures in the Standard Model
  • An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner
  • Certificate-Based Signature Schemes without Pairings or Random Oracles
  • AES Special Session
  • Improved Impossible Differential Attacks on Large-Block Rijndael
  • A Five-Round Algebraic Property of the Advanced Encryption Standard
  • Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication
  • Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip
  • Symmetric Cryptography and Hash Functions
  • Collisions for RC4-Hash
  • New Applications of Differential Bounds of the SDS Structure
  • Authentication
  • HAPADEP: Human-Assisted Pure Audio Device Pairing
  • One-Time Password Access to Any Server without Changing the Server
  • Can “Something You Know” Be Saved?
  • Security Protocols
  • New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
  • A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
  • Strong Accumulators from Collision-Resistant Hashing
  • A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.