Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings /
This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference 2006 (ISPEC 2006), which took place in Hangzhou, China, April 11-14, 2006. The inaugural ISPEC 2005 was held exactly one year earlier in Singapore. As applications of information...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
3903 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Cryptoanalysis
- DPA-Resistant Finite Field Multipliers and Secure AES Design
- Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication
- Diophantine Approximation Attack on a Fast Public Key Cryptosystem
- Further Security Analysis of XTR
- Network Security I
- A Counting-Based Method for Massive Spam Mail Classification
- Model and Estimation of Worm Propagation Under Network Partition
- Tackling Worm Detection Speed and False Alarm in Virus Throttling
- Network Security II
- Using Data Field to Analyze Network Intrusions
- Adversarial Organization Modeling for Network Attack/Defense
- A Novel Dynamic Immunization Strategy for Computer Network Epidemics
- Preventing Web-Spoofing with Automatic Detecting Security Indicator
- Security Protocol
- Security Protocol Analysis with Improved Authentication Tests
- A Protocol of Member-Join in a Secret Sharing Scheme
- More on Shared-Scalar-Product Protocols
- Communication Security
- Efficient Public Key Broadcast Encryption Using Identifier of Receivers
- A Practical Clumped-Tree Multicast Encryption Scheme
- Trojan Horse Attack Strategy on Quantum Private Communication
- Signature and Key Agreement
- Linkable Democratic Group Signatures
- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
- Short (Identity-Based) Strong Designated Verifier Signature Schemes
- Identity Based Key Insulated Signature
- Application I
- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems
- A Design and Implementation of Profile Based Web Application Securing Proxy
- An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards
- Application II
- Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments
- Using ?-Calculus to Formalize Domain Administration of RBAC
- An Efficient Way to Build Secure Disk
- Practical Forensic Analysis in Advanced Access Content System
- Cryptographic Techniques
- Security Analysis of a Server-Aided RSA Key Generation Protocol
- Integrating Grid with Cryptographic Computing
- Three-Round Secret Handshakes Based on ElGamal and DSA
- System Security
- Securing C Programs by Dynamic Type Checking
- A Chaos-Based Robust Software Watermarking
- Privately Retrieve Data from Large Databases
- An Empirical Study of Quality and Cost Based Security Engineering.