Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings /

This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008. The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Matsuura, Kanta (Επιμελητής έκδοσης), Fujisaki, Eiichiro (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008.
Σειρά:Lecture Notes in Computer Science, 5312
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptography
  • On Generating Elements of Orders Dividing p 2k ±p k ?+?1
  • Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
  • Remarks on the Attack of Fouque et al. against the ?IC Scheme
  • Signature and Signcryption
  • Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles
  • Signcryption Scheme in Multi-user Setting without Random Oracles
  • Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices
  • Software Security
  • The Superdiversifier: Peephole Individualization for Software Protection
  • Detecting Java Theft Based on Static API Trace Birthmark
  • Online Network Forensics for Automatic Repair Validation
  • Return Value Predictability Profiles for Self–healing
  • Privacy Protection and Contents Protection
  • Involuntary Information Leakage in Social Network Services
  • Privacy Preserving Computations without Public Key Cryptographic Operation
  • A Novel Framework for Watermarking: The Data-Abstracted Approach
  • Invited Talk
  • The Elliptic Curve Discrete Logarithm Problem: State of the Art
  • Authentication and Access Control
  • An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
  • Analysis of a Biometric Authentication Protocol for Signature Creation Application
  • Efficient Secure Labeling Method under Dynamic XML Data Streams
  • Implementation
  • Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems
  • The Long-Short-Key Primitive and Its Applications to Key Security.