Information Security 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings /
This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009. The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The p...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Security and Cryptology ;
5735 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Analysis Techniques
- A New Approach to ? 2 Cryptanalysis of Block Ciphers
- Analysis and Optimization of Cryptographically Generated Addresses
- Security Analysis of the PACE Key-Agreement Protocol
- Towards Security Notions for White-Box Cryptography
- A Calculus to Detect Guessing Attacks
- Hash Functions
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- On Free-Start Collisions and Collisions for TIB3
- Database Security and Biometrics
- Detection of Database Intrusion Using a Two-Stage Fuzzy System
- Combining Consistency and Confidentiality Requirements in First-Order Databases
- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping
- Iris Recognition in Nonideal Situations
- Algebraic Attacks and Proxy Re-Encryption
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Practical Algebraic Attacks on the Hitag2 Stream Cipher
- A New Construction of Boolean Functions with Maximum Algebraic Immunity
- Distributed System Security
- A2M: Access-Assured Mobile Desktop Computing
- Automated Spyware Collection and Analysis
- Towards Unifying Vulnerability Information for Attack Graph Construction
- Traitor Tracing without A Priori Bound on the Coalition Size
- SISR - A New Model for Epidemic Spreading of Electronic Threats
- Identity Management and Authentication
- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
- Robust Authentication Using Physically Unclonable Functions
- Risks of the CardSpace Protocol
- Applied Cryptography
- Fair E-Cash: Be Compact, Spend Faster
- On the Security of Identity Based Ring Signcryption Schemes
- A Storage Efficient Redactable Signature in the Standard Model
- Generic Construction of Stateful Identity Based Encryption
- Access Control
- Privacy-Aware Attribute-Based Encryption with User Accountability
- Hardware-Assisted Application-Level Access Control
- Towards Trustworthy Delegation in Role-Based Access Control Model
- Secure Interoperation in Multidomain Environments Employing UCON Policies
- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control
- MAC and Nonces
- Nonce Generators and the Nonce Reset Problem
- MAC Precomputation with Applications to Secure Memory
- HMAC without the "Second" Key
- P2P and Web Services
- Adding Trust to P2P Distribution of Paid Content
- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.