Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings /
This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to fo...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Security and Cryptology ;
3650 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Network Security I
- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks
- SVision: A Network Host-Centered Anomaly Visualization Technique
- Trust & Privacy
- Time-Based Release of Confidential Information in Hierarchical Settings
- "Trust Engineering:" From Requirements to System Design and Maintenance - A Working National Lottery System Experience
- A Privacy Preserving Rental System
- Key Management & Protocols
- Constant Round Dynamic Group Key Agreement
- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design
- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms
- On the Notion of Statistical Security in Simulatability Definitions
- Public Key Encryption & Signature
- Certificateless Public Key Encryption Without Pairing
- Tracing-by-Linking Group Signatures
- Chaum's Designated Confirmer Signature Revisited
- Network Security II
- gore: Routing-Assisted Defense Against DDoS Attacks
- IPSec Support in NAT-PT Scenario for IPv6 Transition
- Signcryption
- Hybrid Signcryption Schemes with Outsider Security
- Analysis and Improvement of a Signcryption Scheme with Key Privacy
- Efficient and Proactive Threshold Signcryption
- Crypto Algorithm & Analysis
- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
- Hardware Architecture and Cost Estimates for Breaking SHA-1
- On the Security of Tweakable Modes of Operation: TBC and TAE
- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm
- Cryptography
- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing
- An Oblivious Transfer Protocol with Log-Squared Communication
- Applications
- Electronic Voting: Starting Over?
- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System
- Universally Composable Time-Stamping Schemes with Audit
- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption
- Software Security
- Building a Cryptovirus Using Microsoft's Cryptographic API
- On the Security of the WinRAR Encryption Method
- Towards Better Software Tamper Resistance
- Authorization & Access Control
- Device-Enabled Authorization in the Grey System
- Evaluating Access Control Policies Through Model Checking
- A Cryptographic Solution for General Access Control
- Student Papers
- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting
- A Formal Definition for Trust in Distributed Systems
- A Practical Voting Scheme with Receipts
- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.