Cargando…

Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings /

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008. The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Wu, Tzong-Chen (Editor ), Lei, Chin-Laung (Editor ), Rijmen, Vincent (Editor ), Lee, Der-Tsai (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 5222
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Trusted Computing
  • Property-Based TPM Virtualization
  • A Demonstrative Ad Hoc Attestation System
  • Property-Based Attestation without a Trusted Third Party
  • The Reduced Address Space (RAS) for Application Memory Authentication
  • Database and System Security
  • An Efficient PIR Construction Using Trusted Hardware
  • Athos: Efficient Authentication of Outsourced File Systems
  • BotTracer: Execution-Based Bot-Like Malware Detection
  • Intrusion Detection
  • Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets
  • Distinguishing between FE and DDoS Using Randomness Check
  • Network Security
  • Antisocial Networks: Turning a Social Network into a Botnet
  • Compromising Anonymity Using Packet Spinning
  • Behavior-Based Network Access Control: A Proof-of-Concept
  • Path-Based Access Control for Enterprise Networks
  • Cryptanalysis
  • Cryptanalysis of Rabbit
  • Algebraic Attack on HFE Revisited
  • Revisiting Wiener's Attack - New Weak Keys in RSA
  • Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
  • Digital Signatures
  • Proxy Re-signatures in the Standard Model
  • An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner
  • Certificate-Based Signature Schemes without Pairings or Random Oracles
  • AES Special Session
  • Improved Impossible Differential Attacks on Large-Block Rijndael
  • A Five-Round Algebraic Property of the Advanced Encryption Standard
  • Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication
  • Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip
  • Symmetric Cryptography and Hash Functions
  • Collisions for RC4-Hash
  • New Applications of Differential Bounds of the SDS Structure
  • Authentication
  • HAPADEP: Human-Assisted Pure Audio Device Pairing
  • One-Time Password Access to Any Server without Changing the Server
  • Can "Something You Know" Be Saved?
  • Security Protocols
  • New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
  • A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
  • Strong Accumulators from Collision-Resistant Hashing
  • A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.