Cargando…

Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings /

This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008. The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Matsuura, Kanta (Editor ), Fujisaki, Eiichiro (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:Security and Cryptology ; 5312
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Cryptography
  • On Generating Elements of Orders Dividing p 2k ±p k ?+?1
  • Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
  • Remarks on the Attack of Fouque et al. against the ?IC Scheme
  • Signature and Signcryption
  • Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles
  • Signcryption Scheme in Multi-user Setting without Random Oracles
  • Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices
  • Software Security
  • The Superdiversifier: Peephole Individualization for Software Protection
  • Detecting Java Theft Based on Static API Trace Birthmark
  • Online Network Forensics for Automatic Repair Validation
  • Return Value Predictability Profiles for Self-healing
  • Privacy Protection and Contents Protection
  • Involuntary Information Leakage in Social Network Services
  • Privacy Preserving Computations without Public Key Cryptographic Operation
  • A Novel Framework for Watermarking: The Data-Abstracted Approach
  • Invited Talk
  • The Elliptic Curve Discrete Logarithm Problem: State of the Art
  • Authentication and Access Control
  • An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
  • Analysis of a Biometric Authentication Protocol for Signature Creation Application
  • Efficient Secure Labeling Method under Dynamic XML Data Streams
  • Implementation
  • Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems
  • The Long-Short-Key Primitive and Its Applications to Key Security.