rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540476993

Advances in Information and Computer Security : First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings

by ; ; ; ;
  • ISBN13:

    9783540476993

  • ISBN10:

    3540476997

  • Format: Paperback
  • Copyright: 2006-10-30
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $129.00 Save up to $109.20
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006. The 30 revised full papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on signatures, security evaluation, authentication, encryption and key exchange, network security, security for multimedia, cryptanalysis and implementation, as well as access control.

Table of Contents

ID-based ring signature scheme secure in the standard modelp. 1
A short verifier-local revocation group signature scheme with backward unlinkabilityp. 17
Sound computational interpretation of symbolic hashes in the standard modelp. 33
A requirement centric framework for information security evaluationp. 48
A model-based method for security configuration verificationp. 60
Personal computer privacy : analysis for Korean PC usersp. 76
Short traceable signatures based on bilinear pairingsp. 88
Ring signature with designated linkabilityp. 104
Ad hoc group signaturesp. 120
Rateless codes for the multicast stream authentication problemp. 136
Crossing borders : security and privacy issues of the European e-passportp. 152
A new approach to hide policy for automated trust negotiationp. 168
Towards remote policy enforcement for runtime protection of mobile code using trusted computingp. 179
IP address authorization for secure address proxying using multi-key CGAs and ring signaturesp. 196
A study of detection method of printed image alteration using digital watermarkp. 212
Real-time watermark embedding for high resolution video watermarkingp. 227
Inhibiting card sharing attacksp. 239
A flooding-based DoS/DDoS detecting algorithm based on traffic measurement and predictionp. 252
Hardware stack design : towards an effective defence against frame pointer overwrite attacksp. 268
Modeling of network intrusions based on the multiple transition probabilityp. 278
Chosen ciphertext security from identity-based encryption without strong conditionp. 292
Ciphertext-auditable public key encryptionp. 308
Provably-secure two-round password-authenticated group key exchange in the standard modelp. 322
On the effectiveness of TMTO and exhaustive search attacksp. 337
Low power AES hardware architecture for radio frequency identificationp. 353
The high-speed packet cipher system suitable for small sized datap. 364
A tool for managing security policies in organisationsp. 378
Information flow query and verification for security policy of security-enhanced Linuxp. 389
The complexity of discretionary access controlp. 405
Traceroute based IP channel for sending hidden short messagesp. 421
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program