Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings /
This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008. The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2008.
|
Σειρά: | Lecture Notes in Computer Science,
5312 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Cryptography
- On Generating Elements of Orders Dividing p 2k ±p k ?+?1
- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
- Remarks on the Attack of Fouque et al. against the ?IC Scheme
- Signature and Signcryption
- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles
- Signcryption Scheme in Multi-user Setting without Random Oracles
- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices
- Software Security
- The Superdiversifier: Peephole Individualization for Software Protection
- Detecting Java Theft Based on Static API Trace Birthmark
- Online Network Forensics for Automatic Repair Validation
- Return Value Predictability Profiles for Self–healing
- Privacy Protection and Contents Protection
- Involuntary Information Leakage in Social Network Services
- Privacy Preserving Computations without Public Key Cryptographic Operation
- A Novel Framework for Watermarking: The Data-Abstracted Approach
- Invited Talk
- The Elliptic Curve Discrete Logarithm Problem: State of the Art
- Authentication and Access Control
- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
- Analysis of a Biometric Authentication Protocol for Signature Creation Application
- Efficient Secure Labeling Method under Dynamic XML Data Streams
- Implementation
- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems
- The Long-Short-Key Primitive and Its Applications to Key Security.