Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings /
The International Workshop on Security (IWSEC 2007) was the second in the annualseriesthat startedin 2006.IWSEC 2007washeld at the New Public Hall in Nara, Japan, during October 29-31, 2007. This year there were 112 paper submissions, and from these 30 papers were accepted. Accepted papers came from...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Security and Cryptology ;
4752 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Software and Multimedia Security
- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption
- Design Issues of an Isolated Sandbox Used to Analyze Malwares
- Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique
- Public-Key Cryptography (1)
- Reduction Optimal Trinomials for Efficient Software Implementation of the ? T Pairing
- Experiments on the Linear Algebra Step in the Number Field Sieve
- Batch Pairing Delegation
- Botnet Traffic Detection Techniques by C&C Session Classification Using SVM
- A Global Authentication Scheme for Mobile Ad-Hoc Networks
- An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks
- Intrusion Detection and Identification System Using Data Mining and Forensic Techniques
- Run-Time Randomization to Mitigate Tampering
- Privacy-Preserving Eigentaste-Based Collaborative Filtering
- Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks
- Verifiable Internet Voting Solving Secure Platform Problem
- Enforcement of Integrated Security Policy in Trusted Operating Systems
- Salvia: A Privacy-Aware Operating System for Prevention of Data Leakage
- InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs
- Public-Key Cryptography (2)
- Accredited Symmetrically Private Information Retrieval
- Generic Certificateless Encryption in the Standard Model
- On Security Models and Compilers for Group Key Exchange Protocols
- Processing Multi-parameter Attacktrees with Estimated Parameter Values
- Practical Security Analysis of E-Voting Systems
- Fine-Grained Sticky Provenance Architecture for Office Documents
- Secure Anonymous Communications with Practical Anonymity Revocation Scheme
- GAS: Overloading a File Sharing Network as an Anonymizing System
- A Composite Privacy Protection Model
- Nominative Signature from Ring Signature
- Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications
- How to Find Many Collisions of 3-Pass HAVAL
- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.