Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings /
This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008. The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2008.
|
Edición: | 1st ed. 2008. |
Colección: | Security and Cryptology ;
5312 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Cryptography
- On Generating Elements of Orders Dividing p 2k ±p k ?+?1
- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
- Remarks on the Attack of Fouque et al. against the ?IC Scheme
- Signature and Signcryption
- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles
- Signcryption Scheme in Multi-user Setting without Random Oracles
- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices
- Software Security
- The Superdiversifier: Peephole Individualization for Software Protection
- Detecting Java Theft Based on Static API Trace Birthmark
- Online Network Forensics for Automatic Repair Validation
- Return Value Predictability Profiles for Self-healing
- Privacy Protection and Contents Protection
- Involuntary Information Leakage in Social Network Services
- Privacy Preserving Computations without Public Key Cryptographic Operation
- A Novel Framework for Watermarking: The Data-Abstracted Approach
- Invited Talk
- The Elliptic Curve Discrete Logarithm Problem: State of the Art
- Authentication and Access Control
- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
- Analysis of a Biometric Authentication Protocol for Signature Creation Application
- Efficient Secure Labeling Method under Dynamic XML Data Streams
- Implementation
- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems
- The Long-Short-Key Primitive and Its Applications to Key Security.