Cargando…

Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings /

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to fo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Zhou, Jianying (Editor ), Deng, Robert H. (Editor ), Bao, Feng (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3650
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Network Security I
  • A Dynamic Mechanism for Recovering from Buffer Overflow Attacks
  • SVision: A Network Host-Centered Anomaly Visualization Technique
  • Trust & Privacy
  • Time-Based Release of Confidential Information in Hierarchical Settings
  • "Trust Engineering:" From Requirements to System Design and Maintenance - A Working National Lottery System Experience
  • A Privacy Preserving Rental System
  • Key Management & Protocols
  • Constant Round Dynamic Group Key Agreement
  • A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design
  • ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms
  • On the Notion of Statistical Security in Simulatability Definitions
  • Public Key Encryption & Signature
  • Certificateless Public Key Encryption Without Pairing
  • Tracing-by-Linking Group Signatures
  • Chaum's Designated Confirmer Signature Revisited
  • Network Security II
  • gore: Routing-Assisted Defense Against DDoS Attacks
  • IPSec Support in NAT-PT Scenario for IPv6 Transition
  • Signcryption
  • Hybrid Signcryption Schemes with Outsider Security
  • Analysis and Improvement of a Signcryption Scheme with Key Privacy
  • Efficient and Proactive Threshold Signcryption
  • Crypto Algorithm & Analysis
  • Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
  • Hardware Architecture and Cost Estimates for Breaking SHA-1
  • On the Security of Tweakable Modes of Operation: TBC and TAE
  • A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm
  • Cryptography
  • Compatible Ideal Contrast Visual Cryptography Schemes with Reversing
  • An Oblivious Transfer Protocol with Log-Squared Communication
  • Applications
  • Electronic Voting: Starting Over?
  • Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System
  • Universally Composable Time-Stamping Schemes with Audit
  • A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption
  • Software Security
  • Building a Cryptovirus Using Microsoft's Cryptographic API
  • On the Security of the WinRAR Encryption Method
  • Towards Better Software Tamper Resistance
  • Authorization & Access Control
  • Device-Enabled Authorization in the Grey System
  • Evaluating Access Control Policies Through Model Checking
  • A Cryptographic Solution for General Access Control
  • Student Papers
  • Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting
  • A Formal Definition for Trust in Distributed Systems
  • A Practical Voting Scheme with Receipts
  • New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
  • Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.