close
1.

図書

図書
Stuart Anderson, Sandro Bologna, Massimo Felici (eds.)
出版情報: Berlin : Springer, c2002  xx, 346 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2434
所蔵情報: loading…
2.

図書

図書
Agnes Hui Chan, Virgil Gligor (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xii, 502 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2433
所蔵情報: loading…
目次情報: 続きを見る
Intrusion Detection and Tamper Resistance
Real-Time Intruder Tracing through Self-Replication / Heejin Jang ; Sangwook Kim
On the Difficulty of Protecting Private Keys in Software / Taekyoung Kwon
Intrusion Detection with Support Vector Machines and Generative Models / John S. Baras ; Maben Rabi
Cryptographic Algorithm and Attack Implementation
Small and High-Speed Hardware Architectures for the 3GPP StandardCipher KASUMI / Akashi Satoh ; Sumio Morioka
Fast Software Implementations of SC2000 / Helger Lipmaa
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 / Tim Grembowski ; Roar Lien ; Kris Gaj ; Nghi Nguyen ; Peter Bellows ; Jaroslav Flidr ; Tom Lehman ; Brian Schott
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG / Kahil Jallad ; Jonathan Katz ; Bruce Schneier
Access Control and Trust Management (I)
Role-Based Access Control for E-commerce Sea-of-Data Applications / G. Navarro ; S. Robles ; J. Borrell
An Access Control Model for Tree Data Structures / Alban Gabillon ; Manuel Munier ; Jean-Jacques Bascou ; Laurent Gallon ; Emmanuel Bruno
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI / Ed Dawson ; Javier Lopez ; Jose A. Montenegro ; Eiji Okamoto
Authentication and Privacy
Password Authenticated Key Exchange Based on RSA for ImbalancedWireless Networks / Feng Zhu ; Duncan S. Wong ; Agnes H. Chan ; Robbie Ye
Quantifying Privacy Leakage through Answering Database Queries / Tsan-sheng Hsu ; Churn-Jung Liau ; Da-Wei Wang ; Jeremy K.-P. Chen
A New Offline Privacy Protecting E-cash System with Revokable Anonymity / Weidong Qiu ; Kefei Chen ; Dawu Gu
E-commerce Protocols (I)
Receipt-Free Sealed-Bid Auction / Masayuki Abe ; Koutarou Suzuki
Exclusion-Freeness in Multi-party Exchange Protocols / Nicolás González-Deleito ; Olivier Markowitch
A Realistic Protocol for Multi-party Certified Electronic Mail / Josep Lluís Ferrer-Gomila ; Magdalena Payeras-Capellà ; Llorenç Huguet-Rotger
Signature Schemes
A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification / Shunsuke Araki
Comments to the UNCITRAL Model Law on Electronic Signatures / Apol-lònia Martínez-Nadal
An Anonymous Loan System Based on Group Signature Scheme / Rie Shigetomi ; Akira Otsuka ; Takahide Ogawa ; Hideki Imai
Traceability Schemes for Signed Documents / Shoko Yonezawa ; Goichiro Hanaoka ; Junji Shikata
Cryptography (I)
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications / Emmanuel Bresson ; Jacques Stern
Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m) / Nam-Yeun Kim ; Dae-Ghon Kho ; Kee-Young Yoo
Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m) / Soonhak Kwon ; Heuisu Ryu
Access Control and Trust Management (II)
Conditional Cryptographic Delegation for P2P Data Sharing / Yuji Watanabe ; Masayuki Numao
Certification of Public Keys within an Identity Based System / L. Chen ; K. Harrison ; A. Moss ; D. Soldera ; N.P. Smart
A New Public Key Cryptosystem for Constrained Hardware / Jiande Zheng
Key Management
A Distributed and Computationally Secure Key Distribution Scheme / Vanesa Daza ; Javier Herranz ; Carles Padró ; Germán Sáez
On Optimal Hash Tree Traversal for Interval Time-Stamping
An Efficient Dynamic and Distributed Cryptographic Accumulator / Michael T. Goodrich ; Roberto Tamassia ; Jasminka Hasić
Security Analysis
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks / Katsuyuki Okeya ; Kouichi Sakurai
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks / Bodo Möller
Automated Analysis of Some Security Mechanisms of SCEP / Fabio Martinelli ; Marinella Petrocchi ; Anna Vaccarelli
An Attack on a Protocol for Certified Delivery / José R.M. Monteiro ; Ricardo Dahab
E-commerce Protocols (II)
Oblivious Counter and Majority Protocol / Hiroaki Kikuchi
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network / Wai Han Soo ; Azman Samsudin ; Alwyn Goh
Fingerprinting Concatenated Codes with Efficient Identification / M. Fernandez ; M. Soriano
Cryptography (II)
A Provably Secure Additive and Multiplicative Privacy Homomorphism / Josep Domingo-Ferrer
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars / Yasuyuki Sakai
Author Index
Intrusion Detection and Tamper Resistance
Real-Time Intruder Tracing through Self-Replication / Heejin Jang ; Sangwook Kim
On the Difficulty of Protecting Private Keys in Software / Taekyoung Kwon
3.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c2002  ix, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2467
所蔵情報: loading…
目次情報: 続きを見る
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion)
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / William Aiello ; Steven M. Bellovin ; Matt Blaze ; Ran Canetti ; John Ioannidis ; Angelos D. Keromytis ; Omer Reingold
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion)
Thwarting Timing Attacks Using ATM Networks / Geraint Price
Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion)
Towards a Survivable Security Architecture for Ad-Hoc Networks / Tuomas Aura ; Silja Mäki
Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion)
PIM Security / Dieter Gollmann
PIM Security (Transcript of Discussion)
Merkle Puzzles Revisited - Finding Matching Elements between Lists / Bruce Christianson ; David Wheeler
Merkle Puzzles Revisited (Transcript of Discussion)
Encapsulating Rules of Prudent Security Engineering (Position Paper) / Jan Jürjens
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion)
A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura ; Kunihiko Miyazaki ; Shinji Itoh ; Kazuo Takaragi ; Ryoichi Sasaki
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion)
A Proof of Non-repudiation / Giampaolo Bella ; Lawrence C. Paulson
A Proof of Non-repudiation (Transcript of Discussion) / Larry Paulson
Using Authority Certificates to Create Management Structures / Babak Sadighi Firozabadi ; Marek Sergot ; Olav Bandmann
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion)
Trust Management and Whether to Delegate / Simon N. Foley
Trust Management and Whether to Delegate (Transcript of Discussion)
You Can't Take It with You (Transcript of Discussion) / Mark Lomas
Protocols Using Keys from Faulty Data
Protocols Using Keys from Faulty Data (Transcript of Discussion)
On the Negotiation of Access Control Policies / Virgil D. Gligor ; Himanshu Khurana ; Radostina K. Koleva ; Vijay G. Bharadwaj ; John S. Baras
Negotiation of Access Control Policies (Transcript of Discussion)
Intrusion-Tolerant Group Management in Enclaves (Transcript of Discussion) / Hassen Sa¿idi
Lightweight Authentication in a Mobile Network (Transcript of Discussion) / James Malcolm
Bluetooth Security - Fact or Fiction? (Transcript of Discussion) / Peter Drabwell
Concluding Discussion When Does Confidentiality Harm Security? / Chair: Bruce Christianson
The Last Word / Thucydides
Author Index
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
4.

図書

図書
Lynn Batten, Jennifer Seberry (eds.)
出版情報: Berlin : Springer, c2002  xii, 514 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2384
所蔵情報: loading…
5.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2002  viii, 331 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Information Flow I
Approximate Non-Interference / A. Di Pierro ; C. Hankin ; H. Wiklicky
Quantifying Information Flow / G. Lowe
Secrecy in Multiagent Systems / J. Halpern ; K. O'Neill
Intrusion
Two Formal Analyses of Attack Graphs / S. Jha ; O. Sheyner ; J. Wing
Formal Specification of Intrusion Signatures and Detection Rules / J.-P. Pouzol ; M. Ducasse
Protocols I
Types and Effects for Asymmetric Cryptographic Protocols / A. D. Gordon ; A. Jeffrey
Security Protocol Design via Authentication Tests / J. D. Guttman
Strand Spaces and Rank Functions: More Than Distant Cousins / J. Heather
Applications of Model-Checking
Probabilistic Analysis of Anonymity / V. Shmatikov
Analysis of SPKI/SDSI Certificates Using Model Checking / T. Reps
Protocols II
Capturing Parallel Attacks within the Data Independence Framework / P. J. Broadfoot ; A. W. Roscoe
Polynomial Fairness and Liveness / M. Backes ; B. Pfitzmann ; M. Steiner ; M. Waidner
A Formal Analysis of Some Properties of Kerberos 5 Using MSR / F. Butler ; I. Cervesato ; A. D. Jaggard ; A. Scedrov
Games
A Formal Analysis of Syverson's Rational Exchange Protocol / L. Buttyan ; J.-P. Hubaux ; S. Capkun
Game Analysis of Abuse-Free Contract Signing / S. Kremer ; J.-F. Raskin
Language-Based Security
Fine-Grained Information Flow Analysis for a [lambda]-Calculus with Sum Types / V. Simonet
Cryptographic Types / D. Duggan
Secure Information Flow and Pointer Confinement in a Java-Like Language / A. Banerjee ; D. A. Naumann
Distributed Rights, Access Control, and Watermarking
A Privacy Policy Model for Enterprises / G. Karjoth ; M. Schunter
A Logic for Reasoning about Digital Rights / R. Pucella ; V. Weissman
Hiding Functions and Computational Security of Image Watermarking Systems / N. Tran
Information Flow II
Information Flow Security in Dynamic Contexts / R. Focardi ; S. Rossi
A Simple View of Type-Secure Information Flow in the [pi]-Calculus / F. Pottier
Author Index
Preface
Workshop Committee
Information Flow I
6.

図書

図書
Moti Yung (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiv, 626 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2442
所蔵情報: loading…
7.

図書

図書
George I. Davida, Yair Frankel (eds.)
出版情報: Berlin : Springer, c2001  xiii, 554 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2200
所蔵情報: loading…
8.

図書

図書
Udo Voges (ed.)
出版情報: Berlin : Springer, c2001  xvi, 248 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2187
所蔵情報: loading…
目次情報: 続きを見る
Invited Paper
Designing Safety into Medical Decisions and Clinical Processes / John Fox
Reliability Assessment and Security
Security Assessments of Safety Critical Systems Using HAZOPs / Rune Winther ; Ole-Arnt Johnsen ; Bjørn Axel Gran
Network Security for Substation Automation Systems / Martin Naedele ; Dacfey Dzung ; Michael Stanimirov
A Bayesian Belief Network for Reliability Assessment / Atte Helminen
Safety Case and Safety Analysis
Checking General Safety Criteria on UML Statecharts / Zsigmond Pap ; István Majzik ; András Pataricza
Presenting a Safety Case - A Case Study / Odd Nordland
Safety Functions versus Control Functions / Hans R. Fankhauser
Medical Systems
A Fail-Safe Dual Channel Robot Control for Surgery Applications / Ulrich Laible ; Thomas Bürger ; Günter Pritschow
Modelling the Human in Human Factors / John Rushby
HHuman-Machine Interfac
Analyzing Human-Machine Interactions in Safety-Critical Systems: A Basic Applicable Approach / Oliver Mäckel ; Georg Hoever
Analysis of Incidents Involving Interactive Systems / Alberto Pasquini ; Antonio Rizzo ; Luca Save
COTS - Components off the Shelf
Experimental Evaluation of Fault Handling Mechanisms / Piotr Gawkowski ; Janusz Sosnowski
The COTS Debate in Perspective / Felix Redmill
Testing
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models / Mohamed Kaâniche ; Yannick Le Guédart ; Jean Arlat ; Thierry Boyer
A Comparison Study of the Behavior of Equivalent Algorithms in Fault Injection Experiments in Parallel Superscalar Architectures / Ioannis Vakalis
The Effectiveness of Statistical Testing when Applied to Logic Systems / Silke Kuball ; Gordon Hughes ; John H.R. May ; Julio Gallardo ; Andrew D. John ; Roy B. Carter
Formal Methods
A Classification Scheme for Software Verification Tools with Regard to RTCA/DO-178B / Gunther Zoffmann ; Manfred Gingerl ; Christian Reumann ; Gerald Sonneck
Safety Patterns - The Key to Formal Specification of Safety Requirements.. / Friedemann Bitsch
Formal Support for Fault Modeling and Analysis / Tadeusz Cichocki ; Janusz Górski
Project Experience with IEC 61508 and Its Consequences / Rainer Faller
Control Systems
About the Design of Distributed Control Systems: The Quasi-Synchronous Approach / Paul Caspi ; Christine Mazuet ; Natacha Reynaud Paligot
Dependability Evaluation - From Functional to Structural Modeling / Cláudia Betous-Almeida ; Karama Kanoun
Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems / Stefano Porcarelli ; Felicita Di Giandomenico ; Amine Chohra ; Andrea Bondavalli
Author Index
Invited Paper
Designing Safety into Medical Decisions and Clinical Processes / John Fox
Reliability Assessment and Security
9.

図書

図書
Wenke Lee, Ludovic Mé, Andreas Wespi (eds.)
出版情報: Berlin : Springer, c2001  x, 203 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2212
所蔵情報: loading…
目次情報: 続きを見る
Modeling Attacks
From Declarative Signatures to Misuse IDS / Jean-Philippe Pouzol ; Mireille Ducassé
Logging and IDS Integration
Application-Integrated Data Collection for Security Monitoring / Magnus Almgren ; Ulf Lindqvist
Interfacing Trusted Applications with Intrusion Detection Systems / Marc Welz ; Andrew Hutchison
IDS Cooperation
Probabilistic Alert Correlation / Alfonso Valdes ; Keith Skinner
Designing a Web of Highly-Configurable Intrusion Detection Sensors / Giovanni Vigna ; Richard A. Kemmerer ; Per Blix
Aggregation and Correlation of Intrusion-Detection Alerts / Hervé Debar ; Andreas Wespi
Anomaly Detection
Accurately Detecting Source Code of Attacks That Increase Privilege / Robert K. Cunningham ; Craig S. Stevenson
CDIS: Towards a Computer Immune System for Detecting Network Intrusions / Paul D. Williams ; Kevin P. Anchor ; John L. Bebo ; Gregg H. Gunsch ; Gary D. Lamont
Intrusion Tolerance
Autonomic Response to Distributed Denial of Service Attacks / Dan Sterne ; Kelly Djahandari ; Brett Wilson ; Bill Babson ; Dan Schnackenberg ; Harley Holliday ; Travis Reid
Legal Aspects
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information / Steven R. Johnston
Specification-Based IDS
Experiences with Specification-Based Intrusion Detection / Prem Uppuluri ; R. Sekar
System Health and Intrusion Monitoring Using a Hierarchy of Constraints / Calvin Ko ; Paul Brutch ; Jeff Rowe ; Guy Tsafnat ; Karl Levitt
Author Index
Modeling Attacks
From Declarative Signatures to Misuse IDS / Jean-Philippe Pouzol ; Mireille Ducassé
Logging and IDS Integration
10.

図書

図書
Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
出版情報: Berlin : Springer, c2001  xiv, 504 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2229
所蔵情報: loading…
目次情報: 続きを見る
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
Unconditionally-Secure Oblivious Transfer / Bo Yan ; Shixiong Zhu ; Yumin Wang
Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang ; Iuon-Chang Lin
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Kuo-Feng Hwang
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo ; Lincheng Shen ; Wensen Chang
A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki ; Fumitaka Hoshino ; Tetsutaro Kobayashi
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang ; Futai Zhang
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye ; Junhui Yang ; Zongduo Dai ; Haiwen Ou
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura
A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim ; Hae-Kyung Rhee ; Tai M. Chung ; Young Ik Eom ; Ung-Mo Kim
Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho ; Zbigniew Ciechanowicz
RBAC for XML Document Stores / Michael Hitchens ; Vijay Varadharajan
Cheating Immune Secret Sharing / Xian-Mo Zhang ; JosefPieprzyk
Encryption Sticks (Randomats) / Gideon Samid
Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song ; Sihan Qing
Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono ; Ingo Liebhardt
Enforcing Obligation with Security Monitors / Carlos Ribeiro ; Andre Zuquete ; Paulo Ferreira
Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning ; Yiqun Lisa Yin
Playing Lottery on the Internet / Jianying Zhou ; Chunfu Tan
Privacy Protection for Transactions of Digital Goods / Feng Bao ; Robert Deng
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lua Xu ; Han-liang Xu ; Yan Wang ; Shu-Wang Lu
Threshold Undeniable RSA Signature Scheme / Guilin Wang ; Mingsheng Wang ; Zhanfei Zhou
Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang ; Cheng-Chi Lee ; Yuan-Liang Tang
Square Attack on Reduced Camellia Cipher / Yeping He
Generalization of Elliptic Curve Digital Signature Schemes / Lin You ; Yi Xian Yang ; Chun Qi Zhang
Reasoning about Accountability within Delegation / Bruno Crispo ; Giancarlo Ruffo
A Novel Data Hiding Method for Two-Color Images / Gang Pan ; Yijun Wu ; Zhaohui Wu
An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee ; X. Deng ; H. Zhu
Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu ; Yoshiaki Takata ; Hiroyuki Seki ; Katsuro Inoue
Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang ; Harald Lukhaub ; Werner Zorn
A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp ; Chaiwat Rujimethabhas
Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen ; Adam Bargteil ; David Bindel ; Randy H. Katz ; John Kubiatowicz
A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto ; Colin Boyd ; Ed Dawson
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong ; Chul Kim
NIDS Research Based on Artificial Immunology / Wenjian Luo ; Xianbin Cao ; Xufa Wang
AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Cánovas ; Antonio F. Gómez
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou ; Byrav Ramamurthy ; Spyros S. Magliveras
Dispatching Mobile Agents with Secure Routes in Parallel / Kian-Lee Tan
TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen ; Qian Fang ; Zhihui Du ; Zhenchun Huang ; Sanli Li
Cryptography and Middleware Security / Ulrich Lang ; Dieter Gollmann ; Rudolf Schreiner
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng ; Chung-Huang Yang ; T.R.N. Rao
A Role-Based Model for Access Control in Database Federations / Eric Disson ; Danielle Boulanger ; Gilles Dubois
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li ; Lianli Chang ; Xinmei Wang
A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park ; Im-Yeong Lee
Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi ; Tae Ho Cho
Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland
Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu
SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park ; Jang-Se Lee ; Hwan Kuk Kim ; Jeong-Rye Jeong ; Dong-Bok Yeom ; Sung-Do Chi
A New Semantics of Authentication Logic / Yifa Li
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park ; Sook Ee Jeong ; Chang Soo Kim
Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram
Author Index
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
11.

図書

図書
Ira S. Moskowitz (ed.)
出版情報: Berlin : Springer, c2001  viii, 412 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2137
所蔵情報: loading…
目次情報: 続きを見る
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
Information Hiding through Noisy Channels / Valeri Korjik ; Guillermo Morales-Luna
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding / M. Kivanç Mihçak ; Ramarathnam Venkatesan
Computational Forensic Techniques for Intellectual Property Protection / Jennifer L. Wong ; Darko Kirovski ; Miodrag Potkonjak
Intellectual Property Metering / Farinaz Koushanfar ; Gang Qu
Keyless Public Watermarking for Intellectual Property Authentication
Efficiency Improvements of the Private Message Service / Oliver Berthold ; Sebastian Clauß ; Stefan Köpsell ; Andreas Pfitzmann
A Reputation System to Increase MIX-Net Reliability / Roger Dingledine ; Michael J. Freedman ; David Hopwood ; David Molnar
Neural Networks Functions for Public Key Watermarking / Justin Picard ; Arnaud Robert
A Graph Theoretic Approach to Software Watermarking / Vijay Vazirani ; Saurabh Sinha
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks / Dimitris Thanos
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation / Mikhail J. Atallah ; Victor Raskin ; Michael Crogan ; Christian Hempelmann ; Florian Kerschbaum ; Dina Mohamed ; Sanket Naik
Digital Watermarking of Chemical Structure Sets / Joachim J. Eggers ; Wolf-Dietrich Ihlenfeldt ; Bernd Girod
The Strong Eternity Service / Tonda BeneÜ
Real World Patterns of Failure in Anonymity Systems / Richard Clayton ; George Danezis ; Markus G. Kuhn
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems / Adam Back ; Ulf Möller ; Anton Stiglic
Automatic Detection of a Watermarked Document Using a Private Key / Julien P. Stern ; Jean-Pierre Tillich
Zero-Knowledge Watermark Detection and Proof of Ownership / André Adelsbach ; Ahmad-Reza Sadeghi
F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis / Andreas Westfeld
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience / Hirofumi Muratani
Practical Capacity of Digital Watermarks / Ryo Sugihara
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Thierry Pun
Second Generation Benchmarking and Application Oriented Evaluation / Shelby Pereira ; Maribel Madueno ; Stéphan Marchand-Maillet
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum / Henrique Malvar
Hiding Association Rules by Using Confidence and Support / Elena Dasseni ; Vassilios S. Verykios ; Ahmed K. Elmagarmid ; Elisa Bertino
How to Break a Semi-anonymous Fingerprinting Scheme
An Analysis of One of the SDMI Candidates / Julien Boeuf
Author Index
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
12.

図書

図書
Colin Boyd (ed.)
出版情報: Berlin ; New York : Springer, c2001  xi, 601 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2248
所蔵情報: loading…
目次情報: 続きを見る
Lattice Based Cryptography
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski
The Modular Inversion Hidden Number Problem / Dan Boneh ; Shai Halevi ; Nick Howgrave-Graham
Human Identification
Secure Human Identification Protocols / Nicholas J. Hopper ; Manuel Blum
Invited Talk
Unbelievable Security (Matching AES Security Using Public Key Systems) / Arjen K. Lenstra
Practical Public Key Cryptography
A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4 / Siguna Müller
Computation of Discrete Logarithms in {op F}_{{2}^{607}}cEmmanuel Thomé
Speeding Up XTR / Martijn Stam
An Efficient Implementation of Braid Groups / Jae Choon Cha ; Ki Hyoung Ko ; Sang Jin Lee ; Jae Woo Han ; Jung Hee Cheon
Cryptography Based on Coding Theory
How to Achieve a McEliece-Based Digital Signature Scheme / Nicolas T. Courtois ; Matthieu Finiasz ; Nicolas Sendrier
Efficient Traitor Tracing Algorithms Using List Decoding / Alice Silverberg ; Jessica Staddon ; Judy L. Walker
Block Ciphers
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis / Makoto Sugita ; Kazukuni Kobara ; Hideki Imai
Known-IV Attacks on Triple Modes of Operation of Block Ciphers / Deukjo Hong ; Jaechul Sung ; Seokhie Hong ; Wonil Lee ; Sangjin Lee ; Jongin Lim ; Okyeon Yi
Generic Attacks on Feistel Schemes / Jacques Patarin
A Compact Rijndael Hardware Architecture with S-Box Optimization / Akashi Satoh ; Sumio Morioka ; Kohji Takano ; Seiji Munetoh
Provable Security
Provable Security of KASUMI and 3GPP Encryption Mode f8 / Ju-Sung Kang ; Sang-Uk Shin ; Dowon Hong
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices / Duncan S. Wong ; Agnes H. Chan
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case / Emmanuel Bresson ; Olivier Chevassut ; David Pointcheval
Threshold Cryptography
Fully Distributed Threshold RSA under Standard Assumptions / Pierre-Alain Fouque
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes / Anna Lysyanskaya ; Chris Peikert
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Two-Party Protocols
Oblivious Polynomial Evaluation and Oblivious Neural Learning / Yan-Cheng Chang ; Chi-Jen Lu
Mutually Independent Commitments / Moses Liskov ; Silvio Micali ; Leonid Reyzin ; Adam Smith
Zero Knowledge
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
Responsive Round Complexity and Concurrent Zero-Knowledge / Tzafrir Cohen ; Joe Kilian ; Erez Petrank
Cryptographic Building Blocks
Practical Construction and Analysis of Pseudo-Randomness Primitives / Johan Hastad ; Mats Näslund
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions / Yuriy Tarannikov ; Peter Korolev ; Anton Botev
Elliptic Curve Cryptography
An Extension of KedlayaÆs Point-Counting Algorithm to Superelliptic Curves / Pierrick Gaudry ; Nicolas Gürel
Supersingular Curves in Cryptography / Steven D. Galbraith
Short Signatures from the Weil Pairing / Ben Lynn ; Hovav Shacham
Self-Blindable Credential Certificates from the Weil Pairing / Eric R. Verheul
Anonymity
How to Leak a Secret / Ronald L. Rivest ; Adi Shamir ; Yael Tauman
Key-Privacy in Public-Key Encryption / Mihir Bellare ; Alexandra Boldyreva ; Anand Desai
Provably Secure Fair Blind Signatures with Tight Revocation / Masayuki Abe ; Miyako Ohkubo
tAuthor Index
Lattice Based Cryptography
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski
13.

図書

図書
Vijay Varadharajan, Yi Mu (eds.)
出版情報: Berlin : Springer, c2001  xi, 522 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2119
所蔵情報: loading…
14.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2001  viii, 307 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Non-interference and Information Flow
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar
Robust Declassification / S. Zdancewic ; A. Myers
Access Control
A State-Transition Model of Trust Management and Access Control / A. Chander ; D. Dean ; J. Mitchell
Revocations--A Classification / A. Hagstrom ; S. Jajodia ; F. Parisi-Presicce ; D. Wijesekera
A Logical Reconstruction of SPKI / J. Halpern ; R. van der Meyden
Protocols I
A Security Analysis of the Cliques Protocols Suites / O. Pereira ; J.-J. Quisquater
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules / B. Blanchet
Proving Secrecy is Easy Enough / V. Cortier ; J. Millen ; H. Ruess
Panel
Relating Cryptography and Cryptographic Protocols / A. Scedrov (Moderator) ; R. Canetti ; J. Guttman ; D. Wagner ; M. Waidner
Information Flow and Multi-threading
A New Type System for Secure Information Flow / G. Smith
A Generic Approach to the Security of Multi-threaded Programs / H. Mantel ; A. Sabelfeld
Protocols II
Authenticity by Typing for Security Protocols / A. Gordon ; A. Jeffrey
Computing Symbolic Models for Verifying Cryptographic Protocols / M. Fiore ; M. Abadi
Protocol Insecurity with Finite Number of Sessions is NP-Complete / M. Rusinowitch ; M. Turuani
Intrusion Tolerance and Detection
Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance / P. Liu
Markov Chains, Classifiers, and Intrusion Detection / S. Jha ; K. Tan ; R. Maxion
Log Auditing through Model-Checking / M. Roger ; J. Goubault-Larrecq
Non-interference: Who Needs It? / P. Ryan (Moderator) ; J. McLean ; V. Gligor
Logics for Protocol Verification
A Compositional Logic for Protocol Correctness / N. Durgin ; D. Pavlovic
Logical Relations for Encryption / E. Sumii ; B. Pierce
Secrecy and Privacy
Privacy-Preserving Cooperative Scientific Computations / W. Du ; M. Atallah
Confined Mobile Functions / Z. Kirli
Confidentiality-Preserving Refinement / M. Heisel ; A. Pfitzmann ; T. Santen
Author Index
Preface
Workshop Committee
Non-interference and Information Flow
15.

図書

図書
C. Pandu Rangan, Cunsheng Ding (eds.)
出版情報: Berlin : Springer, c2001  xiii, 349 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2247
所蔵情報: loading…
目次情報: 続きを見る
Invited Lecture Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut
Hashing
Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer
A New Anonymous Fingerprinting Scheme with High Enciphering Rate / M. Kuribayashi ; H. Tanaka
A Parallel Algorithm for Extending Cryptographic Hash Functions / P. Sarkar ; P.J. Schellenberg
Incremental Hash Function Based on Pair Chaining& Modular Arithmetic Combining / B.-M. Goi ; M.U. Siddiqi ; H.-T. Chuah
Algebraic Schemes
Multiples of Primitive Polynomials over GF(2) / K.C. Gupta ; S. Maitra
Fast Generation of Cubic Irreducible Polynomials for XTR / J.M. Kim ; I. Yie ; S.I. Oh ; H.D. Kim ; J. Ryu
CheatingPrevention in Secret Sharingover GF(pt) / J. Pieprzyk ; X.-M. Zhang
Elliptic Curves
An Application of Sieve Methods to Elliptic Curves / S.A. Miri ; V.K. Murty
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography / H. Baier
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography / M. Ciet ; J.-J. Quisquater ; F. Sica
Coding Theory
Frameproof and IPP Codes / D.R. Stinson
Linear Authentication Codes: Bounds and Constructions / R. Safavi-Naini ; H. Wang ; C. Xing
Applications - I
Selective Receipt in Certified E-Mail / S. Kremer ; O. Markowitch
Spatial Domain Digital Watermarking with Buyer Authentication / D.P. Mukherjee
Efficient Public Auction with One-Time Registration and Public Verifiability / B. Lee ; K. Kim ; J. Ma
An Analysis of Integrity Services in Protocols / K. Viswanathan ; C. Boyd ; E. Dawson
Cryptanalysis
Cryptananlysis of the Nonlinear FeedForward Generator / S.S. Bedi ; N.R. Pillai
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree / M. Maurer ; A. Menezes ; E. Teske
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem / A. Youssef ; G. Gong
Distributed Cryptography
Robust and Secure Broadcasting / Y. Mu ; V. Varadharajan
Toward Optimal Player Weights in Secure Distributed Protocols / K. Srinathan ; C.P. Rangan ; V. Kamakoti
Boolean Functions
Autocorrelation Properties of Correlation Immune Boolean Functions
On the Constructingof Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices / M. Fedorova ; Y. Tarannikov
Digital Signatures
A Twin Algorithm for Efficient Generation of Digital Signatures / D. Ramesh
Efficient ôon the Flyö Signature Schemes Based on Integer Factoring / T. Okamoto ; M. Tada ; A. Miyaji
Shift Registers
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator / A. Kholosha
Efficient Software Implementation of Linear Feedback Shift Registers / S. Chowdhury
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 / S. Lim ; S. Kim ; J. Kim
Applications - II
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography / L. Shujun ; M. Xuanqin ; C. Yuanlong
Re-dividingComplexity between Algorithms and Keys (Key Scripts) / G. Samid
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function / E. Kiltz
Author Index
Invited Lecture Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut
Hashing
Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer
16.

図書

図書
David Naccache, Pascal Paillier (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xi, 383 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2274
所蔵情報: loading…
目次情報: 続きを見る
Encryption Schemes
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive / Kouichi Sakurai ; Tsuyoshi Takagi
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages / Jean-Sebastien Coron ; Helena Handschuh ; Marc Joye ; Pascal Paillier ; David Pointcheval ; Christophe Tymen
On Sufficient Randomness for Secure Public-Key Cryptosystems / Takeshi Koshiba
Multi-recipient Public-Key Encryption with Shortened Ciphertext / Kaoru Kurosawa
Signature Schemes
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code / Goichiro Hanaoka ; Junji Shikata ; Yuliang Zheng ; Hideki Imai
Formal Proofs for the Security of Signcryption / Joonsang Baek ; Ron Steinfeld
A Provably Secure Restrictive Partially Blind Signature Scheme / Greg Maitland ; Colin Boyd
Protocols I
M + 1-st Price Auction Using Homomorphic Encryption / Masayuki Abe ; Koutarou Suzuki
Client/Server Tradeoffs for Online Elections / Ivan Damgard ; Mads Jurik
Self-tallying Elections and Perfect Ballot Secrecy / Aggelos Kiayias ; Moti Yung
Protocols II
Efficient 1-Out-n Oblivious Transfer Schemes / Wen-Guey Tzeng
Linear Code Implies Public-Key Traitor Tracing / Takuya Yoshida
Design and Security Analysis of Anonymous Group Identification Protocols / Chan H. Lee ; Xiaotie Deng ; Huafei Zhu
On the Security of the Threshold Scheme
Based on the Chinese Remainder Theorem / Michael Quisquater ; Bart Preneel ; Joos Vandewalle
Cryptanalysis
Solving Underdefined Systems of Multivariate Quadratic Equations / Nicolas Courtois ; Louis Goubin ; Willi Meier ; Jean-Daniel Tacier
Selective Forgery of RSA Signatures with Fixed-Pattern Padding / Arjen K. Lenstra ; Igor E. Shparlinski
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 / Kazukuni Kobara
Side Channels
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation / Roman Novak
A Combined Timing and Power Attack / Werner Schindler
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks / Tetsuya Izu
Invited Talk
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report
ECC Implementations
An Improved Method of Multiplication on Certain Elliptic Curves / Young-Ho Park ; Sangho Oh ; Sangjin Lee ; Jongin Lim ; Maenghee Sung
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves / Sangtae Jeong ; Chang Han Kim
Weierstraß Elliptic Curves and Side-Channel Attacks / Eric Brier
Applications
One-Way Cross-Trees and Their Applications / Sung-Ming Yen
RSA Key Generation with Verifiable Randomness / Ari Juels ; Jorge Guajardo
New Minimal Modified Radix-r Representation with Applications to Smart Cards
Author Index
Encryption Schemes
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive / Kouichi Sakurai ; Tsuyoshi Takagi
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages / Jean-Sebastien Coron ; Helena Handschuh ; Marc Joye ; Pascal Paillier ; David Pointcheval ; Christophe Tymen
17.

図書

図書
Bart Preneel (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  x, 309 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2271
所蔵情報: loading…
目次情報: 続きを見る
Public Key Cryptography
On Hash Function Firewalls in Signature Schemes / Burton S. Kaliski Jr.
Observability Analysis - Detecting When Improved Cryptosystems Fail / Marc Joye ; Jean-Jacques Quisquater ; Sung-Ming Yen ; Moti Yung
Efficient Hardware Implementations
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli / Colin D. Walter
Montgomery in Practice: How to Do It More Efficiently in Hardware / Lejla Batina ; Geeke Muurling
Mist: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis
An ASIC Implementation of the AES SBoxes / Johannes Wolkerstorfer ; Elisabeth Oswald ; Mario Lamberger
Public Key Cryptography: Theory
On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function / Marc Fischlin
The Representation Problem Based on Factoring / Roger Fischlin
Symmetric Ciphers
Ciphers with Arbitrary Finite Domains / John Black ; Phillip Rogaway
Known Plaintext Correlation Attack against RC5 / Atsuko Miyaji ; Masao Nonaka ; Yoshinori Takii
E-Commerce and Applications
Micropayments Revisited / Silvio Micali ; Ronald L. Rivest
Proprietary Certificates / Markus Jakobsson ; Ari Juels ; Phong Q. Nguyen
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption / Giuseppe Ateniese ; Cristina Nita-Rotaru
Digital Signatures
RSA-Based Undeniable Signatures for General Moduli / Steven D. Galbraith ; Wenbo Mao ; Kenneth G. Paterson
Co-operatively Formed Group Signatures / Greg Maitland ; Colin Boyd
Transitive Signature Schemes
Homomorphic Signature Schemes / Robert Johnson ; David Molnar ; Dawn Song ; David Wagner
Public Key Encryption
GEM: A Generic Chosen-Ciphertext Secure Encryption Method / Jean-Sébastien Coron ; Helena Handschuh ; Pascal Paillier ; David Pointcheval ; Christophe Tymen
Securing "Encryption + Proof of Knowledge" in the Random Oracle Model / Masayuki Abe
Discrete Logarithm
Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture / Qi Cheng ; Shigenori Uchiyama
Secure Key-Evolving Protocols for Discrete Logarithm Schemes / Cheng-Fen Lu ; ShiuhPyng Winston Shieh
Author Index
Public Key Cryptography
On Hash Function Firewalls in Signature Schemes / Burton S. Kaliski Jr.
Observability Analysis - Detecting When Improved Cryptosystems Fail / Marc Joye ; Jean-Jacques Quisquater ; Sung-Ming Yen ; Moti Yung
18.

図書

図書
Douglas R. Stinson, Stafford Tavares (eds.)
出版情報: Berlin : Springer, c2001  ix, 338 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2012
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis I
Analysis of IS-95 CDMA Voice Privacy / Muxiang Zhang ; Christopher Carroll ; Agnes Chan
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security / David A. McGrew ; Scott R. Fluhrer
Cryptanalysis of the ôAugmented Family of Cryptographic Parity Circuitsö Proposed at ISW'97 / A.M. Youssef
Block Ciphers - New Designs
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis / Kazumaro Aoki ; Tetsuya Ichikawa ; Masayuki Kanda ; Mitsuru Matsui ; Shiho Moriai ; Junko Nakajima ; Toshio Tokita
DFCv2 / Louis Granboulan ; Phong Q. Nguyen ; Fabrice Noilhan ; Serge Vaudenay
The Block Cipher Hierocrypt / Kenji Ohkuma ; Hirofumi Muratani ; Fumihiko Sano ; Shinichi Kawamura
Symmetric Block Ciphers Based on Group Bases / Valer Canda ; Tran van Trung ; Spyros Magliveras ; Tamas Horvath
Elliptic Curves and Efficient Implementations
Speeding up the Arithmetic on Koblitz Curves of Genus Two / Christian Gunther ; Tanja Lange ; Andreas Stein
On Complexity of Polynomial Basis Squaring in F2m / Huapeng Wu
Security Protocols and Applications
Dynamic Multi-threshold Metering Schemes / Carlo Blundo ; Annalisa De Bonis ; Barbara Masucci ; Douglas R. Stinson
Chained Stream Authentication / Francesco Bergadano ; Davide Cavagnino ; Bruno Crispo
A Global PMI for Electronic Content Distribution / Carlisle Adams ; Robert Zuccherato
Block Ciphers and Hash Functions
A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers / John O. Pliam
Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
HAS-V: A New Hash Function with Variable Output Length / Nan Kyoung Park ; Joon Ho Hwang ; Pil Joong Lee
Boolean Functions and Stream Ciphers
On Welch-Gong Transformation Sequence Generators / G. Gong
Modes of Operation of Stream Ciphers / Jovan Dj. Golic
LILI Keystream Generator / Leonie Ruth Simpson ; E. Dawson ; WilliamL. Millan
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions / Yuliang Zheng ; Xian-Mo Zhang
Public Key Systems
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders / Detlef Huhnlein ; Michael J. Jacobson, Jr. ; Damian Weber
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields / Sachar Paulus
Cryptanalysis II
Root Finding Interpolation Attack / Kaoru Kurosawa ; Tetsu Iwata ; Viet Duong Quang
Differential Cryptanalysis of Reduced Rounds of GOST / Haruki Seki ; Toshinobu Kaneko
Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function
Author Index
Cryptanalysis I
Analysis of IS-95 CDMA Voice Privacy / Muxiang Zhang ; Christopher Carroll ; Agnes Chan
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security / David A. McGrew ; Scott R. Fluhrer
19.

図書

図書
David Naccache (ed.)
出版情報: Berlin : Springer, c2001  xii, 471 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2020
所蔵情報: loading…
20.

図書

図書
Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.)
出版情報: Berlin : Springer, c2001  xiii, 311 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2052
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
An Intelligent Decision Support System for Intrusion Detection and Response / Dipankar Dasgupta ; Fabio A. Gonzalez
Mathematical Models of the Covert Channels / Alexander Grusho
Open Issues in Formal Methods for Cryptographic Protocol Analysis / Catherine Meadows
Future Directions in Role-Based Access Control Models / Ravi Sandhu
Secure Networked Computing / Vijay Varadharajan
Network Security Systems: Foundations, Models, and Architectures Composability of Secrecy / Jan Jurjens
Agent-Based Model of Computer Network Security System: A Case Study / Vladimir I. Gorodetski ; O. Karsayev ; A. Khabalov ; I. Kotenko ; Leonard J. Popyack ; Victor A. Skormin
Security Considerations and Models for Service Creation in Premium IP Networks / Michael Smirnov
Secure Systems Design Technology / Peter D. Zegzhda ; Dmitry P. Zegzhda
A Privacy-Enhancing e-Business Model Based on Infomediaries / Dimitris Gritzalis ; Konstantinos Moulinos ; Konstantinos Kostis
Applying Practical Formal Methods to the Specification and Analysis of Security Properties / Constance Heitmeyer
Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ) / Andrey Kostogryzov
Analyzing Separation of Duties in Petri Net Workflows / Konstantin Knorr ; Harald Weidner
Intrusion Detection: Foundations and Models
Information Security with Formal Immune Networks / Alexander O. Tarakanov
BASIS: A Biological Approach to System Information Security / Jose G. Delgado-Frias ; Dennis L. McGee ; Joseph V. Giordano
Learning Temporal Regularities of User Behavior for Anomaly Detection / Alexandr Seleznyov ; Oleksiy Mazhelis ; Seppo Puuronen
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining / Harjit Singh ; Steven Furnell ; Benn Lines ; Paul Dowland
Access Control, Authentication, and Authorization
Typed MSR: Syntax and Examples / Iliano Cervesato
The Set and Function Approach to Modeling Authorization in Distributed Systems / Steve Barker ; Tatyana Ryutov ; Clifford Neuman
Fenix Secure Operating System: Principles, Models, and Architecture / Pavel G. Stepanov ; Alexey D. Otavin
Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods
Generalized Oblivious Transfer Protocols Based on Noisy Channels / Valeri Korjik ; Kirill Morozov
Controlled Operations as a Cryptographic Primitive / Boris V. Izotov ; Alexander A. Moldovyan ; Nick A. Moldovyan
Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes / Viktor Yakovlev ; Valery Korjik ; Alexander Sinuk
Dynamic Group Key Management Protocol / Ghassan Chaddoud ; Isabelle Chrisment ; Andre Schaff
SVD-Based Approach to Transparent Embedding Data into Digital Images / Vladimir Samoilov
Fast Encryption Algorithm Spectr-H64 / Nick D. Goots
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols / Antonio Durante ; Riccardo Focardi ; Roberto Gorrieri
On Some Cryptographic Properties of Rijndael / Selcuk Kavut ; Melek D. Yucel
Author Index
Invited Talks
An Intelligent Decision Support System for Intrusion Detection and Response / Dipankar Dasgupta ; Fabio A. Gonzalez
Mathematical Models of the Covert Channels / Alexander Grusho
21.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c2001  viii, 255 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2133
所蔵情報: loading…
目次情報: 続きを見る
Keynote Address: Security Protocols and the Swiss Army Knife / Roger Needham
Mergers and Principals / Dieter Gollmann
Discussion
Authentication and Naming / Michael Roe
Users and Trust in Cyberspace / Pekka Nikander* ; Kristiina Karvonen
Interactive Identification Protocols / Peter Landrock
Open Questions / Peter Ryan
Looking on the Bright Side of Black-Box Cryptography / Matt Blaze
Government Access to Keys - Panel Discussion / Ross Anderson ; Bill Harbison ; Mark Lomas
Making Sense of Specifications: The Formalization of SET / Giampaolo Bella ; Fabio Massacci* ; Lawrence C. Paulson ; Piero Tramontano
Lack of Explicitness Strikes Back
Review and Revocation of Access Privileges Distributed with PKI Certificates / Himanshu Khurana ; Virgil D. Gligor*
The Correctness of Crypto Transaction Sets
Micro-management of Risk in a Trust-Based Billing System / John Ioannidis
Broadening the Scope of Fault Tolerance within Secure Services / Geraint Price
DOS-Resistant Authentication with Client Puzzles / Tuomas Aura* ; Pekka Nikander ; Jussipekka Leiwo
Public-Key Crypto-systems Using Symmmetric-Key Crypto-algorithms / Bruce Christianson* ; Bruno Crispo ; James A. Malcolm
Denial of Service - Panel Discussion / Virgil Gligor
The Resurrecting Duckling - What Next? / Frank Stajano
An Anonymous Auction Protocol Using "Money Escrow" / George Danezis
Short Certification of Secure RSA Modulus / Wenbo Mao
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis / Takaaki Shigematsu ; Seiichi Susaki ; Tsukasa Saitoh ; Hisashi Toyoshima ; Chikako Kurita ; Satoru Tezuka ; Ryoichi Sasaki
I Cannot Tell a Lie
Afterward
Author Index
Keynote Address: Security Protocols and the Swiss Army Knife / Roger Needham
Mergers and Principals / Dieter Gollmann
Discussion
22.

図書

図書
Burton S. Kaliski, Jr., Çetin K. Koç, Christof Paar (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiv, 612 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2523
所蔵情報: loading…
23.

図書

図書
Roger Dingledine, Paul Syverson (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2482
所蔵情報: loading…
24.

図書

図書
Pil Joong Lee, Chae Hoon Lim (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c2003  xi, 536 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2587
所蔵情報: loading…
25.

図書

図書
edited by Yves Deswarte ... [et al]
出版情報: Boston : Kluwer Academic Publishers, 2004  xiv, 548 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 147
所蔵情報: loading…
26.

図書

図書
edited by Theo Dimitrakos, Fabio Martinelli
出版情報: New York : Springer, 2005  x, 246 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 173
所蔵情報: loading…
目次情報: 続きを見る
Information Flow Analysis for Probabilistic Timed Automata
Dynamic Security Labels
Pattern-Matching Spi-Calculus
Interactive Trust Management and Negotiation
Tuple-Space Coordination Models
Deploying Network Security Policies
Auditing Accountability in Decentralized Systems
Overriding Access Control
Complementing Computational Protocol Analysis
Information Flow Analysis for Probabilistic Timed Automata
Dynamic Security Labels
Pattern-Matching Spi-Calculus
27.

図書

図書
edited by David Chadwick, Bart Preneel
出版情報: New York : Springer, 2005  xii, 287 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 175
所蔵情報: loading…
28.

図書

図書
edited by Enrico Nardelli, Maurizio Talamo
出版情報: New York : Springer, 2005  vi, 149 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 177
所蔵情報: loading…
目次情報: 続きを見る
Authentication, Encryption, Certification and Traceability in E-Services
Safeguards, Interception, Tracking and Firewall Technology
Administration, Management, Risk Analysis and Organizational Issues
Mobile Access, Network Protocol and Multilateral Security
Certification Authorities
Public Key Infrastructures
Authentication, Encryption, Certification and Traceability in E-Services
Safeguards, Interception, Tracking and Firewall Technology
Administration, Management, Risk Analysis and Organizational Issues
29.

図書

図書
edited by Ryoichi Sasaki ... [et al.]
出版情報: New York : Springer, 2005  xvi, 612 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 181
所蔵情報: loading…
目次情報: 続きを見る
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
Internet and Web Security
Mobility and Ubiquitous Security
Secure Commercial Systems
Trusted Computing Systems
Accountable Anonymous E-Mail
Protecting Consumer Data in Composite Web Services
Enhancing Security in ERP Systems
Architecture for User Authentication and Key Exchange
A Secure Quantum Communication Protocol Using Insecure Public Channels
Mathematical Models of IP Traceback Methods
Secure Human Communications Based on Biometrics Signals
Designated-Verifier Proxy Signature Schemes
Signcryption in Hierarchical Identity Based Cryptosystem
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
30.

図書

図書
David Chadwick, Gansen Zhao (eds.)
出版情報: Berlin : Springer, c2005  xi, 270 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3545
所蔵情報: loading…
31.

図書

図書
Bimal Roy (ed.)
出版情報: Berlin : Springer, c2005  xiv, 701 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3788
所蔵情報: loading…
32.

図書

図書
Subhamoy Maitra, C.E. Veni Madhavan, Ramarathnam Venkatesan (eds.)
出版情報: Berlin : Springer, c2005  xiv, 416 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3797
所蔵情報: loading…
33.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  ix, 349 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3364
所蔵情報: loading…
34.

図書

図書
Jianying Zhou ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 516 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3650
所蔵情報: loading…
35.

図書

図書
Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.)
出版情報: Berlin : Springer, c2005  xiv, 480 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3685
所蔵情報: loading…
36.

図書

図書
Yvo G. Desmedt ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xi, 348 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3810
所蔵情報: loading…
37.

図書

図書
Refik Molva, Gene Tsudik, Dirk Westhoff (eds.)
出版情報: Berlin : Springer, c2005  viii, 217 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3813
所蔵情報: loading…
38.

図書

図書
Mauro Barni ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 414 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3727
所蔵情報: loading…
39.

図書

図書
David Pointcheval (ed.)
出版情報: Berlin : Springer, c2006  xi, 364 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3860
所蔵情報: loading…
40.

図書

図書
Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki (eds.)
出版情報: Berlin : Springer, c2004  viii, 344 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3233
所蔵情報: loading…
41.

図書

図書
Pil Joong Lee (ed.)
出版情報: Berlin ; Tokyo : Springer, c2004  xvi, 546 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3329
所蔵情報: loading…
42.

図書

図書
Dieter Hutter, Markus Ullmann (eds.)
出版情報: Berlin : Springer, c2005  xi, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3450
所蔵情報: loading…
43.

図書

図書
David Martin, Andrei Serjantov (eds.)
出版情報: Berlin ; Tokyo : Springer, c2005  viii, 343 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3424
所蔵情報: loading…
44.

図書

図書
Choonsik Park, Seongtaek Chee (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c2005  xiv, 490 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3506
所蔵情報: loading…
45.

図書

図書
Serge Vaudenay (ed.)
出版情報: Berlin : Springer, c2005  xiii, 431 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3386
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
A New Related Message Attack on RSA / Oded Yacobi ; Yacov Yacobi
Breaking a Cryptographic Protocol with Pseudoprimes / Daniel Bleichenbacher
Experimenting with Faults, Lattices and the DSA / David Naccache ; Phong Q. Nguy n ; Michael Tunstall ; Claire Whelan
Key Establishment
Securing RSA-KEM via the AES / Jakob Jonsson ; Matthew J.B. Robshaw
One-Time Verifier-Based Encrypted Key Exchange / Michel Abdalla ; Olivier Chevassut ; David Pointcheval
Password-Based Authenticated Key Exchange in the Three-Party Setting / Pierre-Alain Fouque
Optimization
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods / Werner Schindler
Symmetric Subgroup Membership Problems / Kristian Gjosteen
Building Blocks
Optimizing Robustness While Generating Shared Secret Safe Primes / Emil Ong ; John Kubiatowicz
Fast Multi-computations with Integer Similarity Strategy / Wu-Chuan Yang ; Dah-Jyh Guan ; Chi-Sung Laih
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order / Endre Bangerter ; Jan Camenisch ; Ueli Maurer
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries / Cheng-Kang Chu ; Wen-Guey Tzeng
RSA Cryptography
Converse Results to the Wiener Attack on RSA / Ron Steinfeld ; Scott Contini ; Huaxiong Wang ; Josef Pieprzyk
RSA with Balanced Short Exponents and Its Application to Entity Authentication / Hung-Min Sun ; Cheng-Ta Yang
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity / Ryotaro Hayashi ; Keisuke Tanaka
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited / Julien Cathalo ; Jean-Sébastien Coron
Multivariate Asymmetric Cryptography
Tractable Rational Map Signature / Lih-Chung Wang ; Yuh-Hua Hu ; Feipei Lai ; Chun-Yen Chou ; Bo-Yin Yang
Cryptanalysis of the Tractable Rational Map Cryptosystem / Antoine Joux ; Sébastien Kunz-Jacques ; Frédéric Muller ; Pierre-Michel Ricordel
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems / Christopher Wolf ; Bart Preneel
Cryptanalysis of HFEv and Internal Perturbation of HFE / Jintai Ding ; Dieter Schmidt
Signature Schemes
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible / Louis Granboulan
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring / Dario Catalano ; Rosario Gennaro
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme / Wakaha Ogata ; Kaoru Kurosawa ; Swee-Huay Heng
Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions / Ivan Damgard ; Kasper Dupont
Identity-Based Cryptography
Improved Identity-Based Signcryption / Liqun Chen ; John Malone-Lee
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption / Joonsang Baek ; Reihaneh Safavi-Naini ; Willy Susilo
CBE from CL-PKE: A Generic Construction and Efficient Schemes / Sattam S. Al-Riyami ; Kenneth G. Paterson
Best Paper Award
A Verifiable Random Function with Short Proofs and Keys / Yevgeniy Dodis ; Aleksandr Yampolskiy
Author Index
Cryptanalysis
A New Related Message Attack on RSA / Oded Yacobi ; Yacov Yacobi
Breaking a Cryptographic Protocol with Pseudoprimes / Daniel Bleichenbacher
46.

図書

図書
Jessica Fridrich (ed.)
出版情報: Berlin : Springer, c2004  ix, 369 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3200
所蔵情報: loading…
目次情報: 続きを見る
Digital Media Watermarking: Session Chair / Lisa MarvelSession 1:
An Implementation of, and Attacks on, Zero-Knowledge Watermarking / Scott Craver ; Bede Liu ; Wayne Wolf
On the Possibility of Non-invertible Watermarking Schemes / Qiming Li ; Ee-Chien Chang
Reversing Global and Local Geometrical Distortions in Image Watermarking / Dariusz Bogumil
On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems / Wei Sun ; En-hui Yang
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking / Andrea Abrardo ; Mauro Barni
Steganalysis: Session Chair / Session 2:
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes / Jessica Fridrich
Exploiting Preserved Statistics for Steganalysis / Rainer Böhme ; Andreas Westfeld
Improved Detection of LSB Steganography in Grayscale Images / Andrew D. Ker
An Improved Sample Pairs Method for Detection of LSB Embedding / Peizhong Lu ; Xiangyang Luo ; Qingyang Tang ; Li Shen
Forensic Applications: Session Chair / Session 3:
Statistical Tools for Digital Forensics / Alin C. Popescu ; Hany Farid
Relative Generic Computational Forensic Techniques / Jennifer L. Wong ; Miodrag Potkonjak
Steganography: Session Chair / Session 4:
Syntax and Semantics-Preserving Application-Layer Protocol Steganography / Norka B. Lucena ; James Pease ; Payman Yadollahpour ; Steve J. Chapin
A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy / Igor A. Bolshakov
Software Watermarking: Session Chair / John McHughSession 5:
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks / Christian Collberg ; Andrew Huntwork ; Edward Carter ; Gregg Townsend
Threading Software Watermarks / Jasvir Nagra ; Clark Thomborson
Soft IP Protection: Watermarking HDL Codes / Lin Yuan ; Pushkin R. Pari ; Gang Qu
Security and Privacy: Session Chair / Ross AndersonSession 6:
An Asymmetric Security Mechanism for Navigation Signals / Markus G. Kuhn
Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme / Jae-Gwi Choi ; Ji-Hwan Park ; Ki-Ryong Kwon
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures / Xinwen Fu ; Bryan Graham ; Dong Xuan ; Riccardo Bettati ; Wei Zhao
Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring / Hirofumi Muratani
Anonymity: Session Chair / Andreas PfitzmannSession 7:
Statistical Disclosure or Intersection Attacks on Anonymity Systems / George Danezis ; Andrei Serjantov
Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic / Claudia Díaz ; Bart Preneel
The Hitting Set Attack on Anonymity Protocols / Dogan Kesdogan ; Lexi Pimenidis
Data Hiding in Unusual Content: Session Chair / Session 8:
Information Hiding in Finite State Machine
Covert Channels for Collusion in Online Computer Games / Steven J. Murdoch ; Piotr Zielinski
Author Index
Digital Media Watermarking: Session Chair / Lisa MarvelSession 1:
An Implementation of, and Attacks on, Zero-Knowledge Watermarking / Scott Craver ; Bede Liu ; Wayne Wolf
On the Possibility of Non-invertible Watermarking Schemes / Qiming Li ; Ee-Chien Chang
47.

図書

図書
Joe Kilian (Ed.)
出版情報: Berlin : Springer, c2005  xii, 619 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3378
所蔵情報: loading…
48.

図書

図書
editor, Larry D. Sanson ; sponsored by IEEE Lexington Section, USA ... [et al.]
出版情報: Piscataway, New Jersey : IEEE, c2003  [xviii], 603 p. ; 28 cm
所蔵情報: loading…
49.

図書

図書
Marc Joye, Jean-Jacques Quisquater (eds.)
出版情報: Berlin : Springer, c2004  xiii, 454 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3156
所蔵情報: loading…
目次情報: 続きを見る
Side Channels I
Towards Efficient Second-Order Power Analysis
Correlation Power Analysis with a Leakage Model / Eric Brier ; Christophe Clavier ; Francis Olivier
Power Analysis of an FPGA (Implementation of Rijndael: Is Pipelining a DPA Countermeasure?) / Francois-Xavier Standaert ; Siddika Berna Örs ; Bart Preneel
Modular Multiplication
Long Modular Multiplication for Cryptographic Applications / Laszlo Hars
Leak Resistant Arithmetic / Jean-Claude Bajard ; Laurent Imbert ; Pierre-Yvan Liardet ; Yannick Teglia
Low Resources I / Soonhak Kwon ; Kris Gaj ; Chang Hoon Kim ; Chun Pyo Hong
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic / E. Öztürk ; B. Sunar ; E. Savas
A Low-Cost ECC Coprocessor for Smartcards / Harald Aigner ; Holger Bock ; Markus Hütter ; Johannes Wolkerstorfer
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs / Nils Gura ; Arun Patel ; Arvinderpal Wander ; Hans Eberle ; Sheueling Chang Shantz
Implementation Aspects
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations / Johann Großschädl ; Erkay Savas ; Roberto Maria Avanzi
Collision Attacks
A Collision-Attack on AES (Combining Side Channel- and Differential-Attack) / Kai Schramm ; Gregor Leander ; Patrick Felke ; Christof Paar
Enhancing Collision Attacks / Hervé Ledig ; Frédéric Müller ; Frédéric Valette
Side Channels II
Simple Power Analysis of Unified Code for ECC Double and Add / Colin D. Walter
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction / Kerstin Lemke
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve / Loren D. Olson
Switching Blindings with a View Towards IDEA / Olaf Neiße ; Jürgen Pulkus
Fault Attacks
Fault Analysis of Stream Ciphers / Jonathan J. Hoch ; Adi Shamir
A Differential Fault Attack Against Early Rounds of (Triple-)DES / Ludger Hemme
Hardware Implementation I
An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications / Marco Bucci ; Raimondo Luzzi
Improving the Security of Dual-Rail Circuits / Danil Sokolov ; Julian Murphy ; Alex Bystrov ; Alex Yakovlev
Side Channels III
A New Attack with Side Channel Leakage During Exponent Recoding Computations / Yasuyuki Sakai ; Kouichi Sakurai
Defeating Countermeasures Based on Randomized BSD Representations / Pierre-Alain Fouque ; Guillaume Poupard
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems / Pradeep Kumar Mishra
Efficient Countermeasures Against RPA, DPA, and SPA / Hideyo Mamiya ; Atsuko Miyaji ; Hiroaki Morimoto
Low Resources II
Strong Authentication for RFID Systems
Using the AES Algorithm / Martin Feldhofer ; Sandra Dominikus
TTS: High-Speed Signatures on a Low-Cost Smart Card / Bo-Yin Yang ; Jiun-Ming Chen ; Yen-Hung Chen
Hardware Implementation II
XTR Implementation on Reconfigurable Hardware / Eric Peeters ; Michael Neve ; Mathieu Ciet
Concurrent Error Detection Schemes for Involution Ciphers / Nikhil Joshi ; Kaijie Wu ; Ramesh Karri
Authentication and Signatures
Public Key Authentication with One (Online) Single Addition / Marc Girault ; David Lefranc
Attacking DSA Under a Repeated Bits Assumption / P.J. Leadbitter ; D. Page ; N.P. Smart
How to Disembed a Program? / Benoît Chevallier-Mames ; David Naccache ; Pascal Paillier ; David Pointcheval
Author Index
Side Channels I
Towards Efficient Second-Order Power Analysis
Correlation Power Analysis with a Leakage Model / Eric Brier ; Christophe Clavier ; Francis Olivier
50.

図書

図書
Matt Franklin (ed.)
出版情報: Berlin ; Tokyo : Springer, [2004]  xi, 578 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3152
所蔵情報: loading…
51.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2004  viii, 292 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committees
Protocols I
A Theory of Dictionary Attacks and its Complexity / S. Delaune ; F. Jacquemard
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols / O. Pereira ; J. Quisquater
Abstraction and Refinement in Protocol Derivation / A. Datta ; A. Derek ; J. Mitchell ; D. Pavlovic
Access Control
A Distributed Calculus for Role-Based Access Control / C. Braghin ; D. Gorla ; V. Sassone
From Stack Inspection to Access Control: A Security Analysis for Libraries / F. Besson ; T. Blanc ; C. Fournet ; A. Gordon
Intrusion Detection
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework / F. Cuppens ; T. Sans ; S. Gombault
Using Active Learning in Intrusion Detection / M. Almgren ; E. Jonsson
Information Flow
Secure Information Flow by Self-Composition / G. Barthe ; P. D'Argenio ; T. Rezk
Lenient Array Operations for Practical Secure Information Flow / Z. Deng ; G. Smith
Security Policies
Owned Policies for Information Security / H. Chen ; S. Chong
Cassandra: Flexible Trust Management, Applied to Electronic Health Records / M. Becker ; P. Sewell
The Consistency of Task-Based Authorization Constraints in Workflow Systems / K. Tan ; J. Crampton ; C. Gunter
Declassification and Information Flow
Enforcing Robust Declassification / A. Myers ; A. Sabelfeld ; S. Zdancewic
Modelling Downgrading in Information Flow Security / A. Bossi ; C. Piazza ; S. Rossi
Formal Methods and Cryptography
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library / M. Backes ; B. Pfitzmann
Universally Composable Signature, Certification, and Authentication / R. Canetti
Panel: Formal Methods and Cryptography
Authorization
By Reason and Authority: A System for Authorization of Proof-Carrying Code / N. Whitehead ; M. Abadi ; G. Necula
A Formal Foundation for XrML / J. Halpern ; V. Weissman
Protocols II
Formal Analysis of Multi-Party Contract Signing / R. Chadha ; S. Kremer ; A. Scedrov
Symbolic Model Checking the Knowledge of the Dining Cryptographers / K. Su ; R. van der Meyden
Author Index
Preface
Workshop Committees
Protocols I
52.

図書

図書
Maritta Heisel, Peter Liggesmeyer, Stefan Wittmann (eds.)
出版情報: Berlin : Springer, c2004  xi, 337 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3219
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
The Deconstruction of Safety Arguments Through Adversarial Counter-Argument / J.M. Armstrong ; S.E. Paynter
Using Fuzzy Self-Organising Maps for Safety Critical Systems / Z. Kurd ; T.P. Kelly
Using Formal Methods in a Retrospective Safety Case / L.-H. Eriksson
Reliability
A Highly Fault Detectable Cache Architecture for Dependable Computing / H.R. Zarandi ; S.G. Miremadi
An Empirical Exploration of the Difficulty Function / J.G.W. Bentley ; P.G. Bishop ; M. van der Meulen
Towards the Integration of Fault, Resource, and Power Management / T. Saridakis
Human Factors
Modeling Concepts for Safety-Related Requirements in Sociotechnical Systems / M. Cebulla
Analysing Mode Confusion: An Approach Using FDR2 / B. Buth
Handling Safety Critical Requirements in System Engineering Using the B Formal Method / D. Essame
Transportation
A Hybrid Testing Methodology for Railway Control Systems / G. De Nicola ; P. di Tommaso ; R. Esposito ; F. Flammini ; A. Orazzo
Actuator Based Hazard Analysis for Safety Critical Systems / P. Johannessen ; F. Torner ; J. Torin
Performability Measures of the Public Mobile Network of a Tele Control System / E. Ciancamerla ; M. Minichino
Software Development
PLC-Based Safety Critical Software Development for Nuclear Power Plants / J. Yoo ; S. Cha ; H.S. Son ; C.H. Kim ; J.-S. Lee
Compositional Hazard Analysis of UML Component and Deployment Models / H. Giese ; M. Tichy ; D. Schilling
Automatic Test Data Generation from Embedded C Code / E. Dillon ; C. Meudec
Fault Tree Analysis
State-Event-Fault-Trees - A Safety Analysis Model for Software Controlled Systems / B. Kaiser ; C. Gramlich
Safety Requirements and Fault Trees Using Retrenchment / R. Banach ; R. Cross
The Effects on Reliability of Integration of Aircraft Systems Based on Integrated Modular Avionics / D. Rehage ; U.B. Carl ; M. Merkel ; A. Vahl
Automotive Telematics - Road Safety Versus IT Security? / R.G. Herrtwich
Formal Methods and Systems
Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture / H. Pfeifer ; F.W. von Henke
Refinement of Fault Tolerant Control Systems in B / L. Laibinis ; E. Troubitsyna
Numerical Integration of PDEs for Safety Critical Applications Implemented by I&C Systems / M. Vollmer
Security and Quality of Service
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth / A. Aldini ; M. Bernardo
Dependability Benchmarking of Web-Servers / J. Duraes ; M. Vieira ; H. Madeira
Hazard and Risk Analysis
An Approach for Model-Based Risk Assessment / B.A. Gran ; R. Fredriksen ; A.P.-J. Thunem
How Explicit Are the Barriers to Failure in Safety Arguments? / S.P. Smith ; M.D. Harrison ; B.A. Schupp
Author Index
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
53.

図書

図書
Kan Zhang, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2004  xii, 442 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3225
所蔵情報: loading…
目次情報: 続きを見る
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
Storage-Efficient Stateless Group Key Revocation / Pan Wang ; Peng Ning ; Douglas S. Reeves
Digital Signatures
Low-Level Ideal Signatures and General Integrity Idealization / Michael Backes ; Birgit Pfitzmann ; Michael Waidner
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA / Julien Cathalo ; Benoît Libert ; Jean-Jacques Quisquater
How to Break and Repair a Universally Composable Signature Functionality / Dennis Hofheinz
New Algorithms
RSA Accumulator Based Broadcast Encryption / Craig Gentry ; Zulfikar Ramzan
Chameleon Hashing Without Key Exposure / Xiaofeng Chen ; Fangguo Zhang ; Kwangjo Kim
Radix-r Non-Adjacent Form / Tsuyoshi Takagi ; Sung-Ming Yen ; Bo-Ching Wu
Cryptanalysis
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor / Raphael C.-W. Phan ; Helena Handschuh
Security Analysis of Two Signcryption Schemes / Guilin Wang ; Robert H. Deng ; DongJin Kwak ; SangJae Moon
On The Security of Key Derivation Functions / Carlisle Adams ; Guenther Kramer ; Serge Mister ; Robert Zuccherato
Intrusion Detection
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery / Hai Wang ; Peng Liu ; Lunqun Li
A Model for the Semantics of Attack Signatures in Misuse Detection Systems / Michael Meier
Detection of Sniffers in an Ethernet Network / Zouheir Trabelsi ; Hamza Rahmani
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks / Mark Foster ; Joseph N. Wilson ; Shigang Chen
Securing DBMS: Characterizing and Detecting Query Floods / Elisa Bertino ; Teodoro Leggieri ; Evimaria Terzi
Access Control
An XML-Based Approach to Document Flow Verification / Elena Ferrari ; Giovanni Mella
Model-Checking Access Control Policies / Dimitar P. Guelev ; Mark Ryan ; Pierre Yves Schobbens
A Distributed High Assurance Reference Monitor / Ajay Chander ; Drew Dean ; John Mitchell
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control / D. Nali ; C. Adams ; A. Miri
Human Authentication
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security) / Richard Bergmair ; Stefan Katzenbeisser
Image Recognition CAPTCHAs / Monica Chew ; J.D. Tygar
Certificate Management
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model / Zhengyi Le ; Yi Ouyang ; James Ford ; Fillia Makedon
Certificate Recommendations to Improve the Robustness of Web of Trust / Qinglin Jiang
Mobile and Ad Hoc Security
Universally Composable Secure Mobile Agent Computation / Ke Xu ; Stephen R. Tate
Re-thinking Security in IP Based Micro-Mobility / Jukka Ylitalo ; Jan Melén ; Pekka Nikander ; Vesa Torvinen
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group / Qianhong Wu ; Changjie Wang ; Yumin Wang
Web Security
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions / HongQian Karen Lu ; Asad Ali
Provable Unlinkability Against Traffic Analysis Already After <$>{\cal O}<$>(log(n)) Steps! / Marcin Gomułkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
An Efficient Online Electronic Cash with Unlinkable Exact Payments / Toru Nakanishi ; Mitsuaki Shiota ; Yuji Sugiyama
Digital Rights Management
Modifiable Digital Content Protection in P2P / Heejae Park ; Jong Kim
Survey on the Technological Aspects of Digital Rights Management / William Ku ; Chi-Hung Chi
Detecting Software Theft via Whole Program Path Birthmarks / Ginger Myles ; Christian Collberg
Software Security
Effective Security Requirements Analysis: HAZOP and Use Cases / Thitima Srivatanakul ; John A. Clark ; Fiona Polack
The Obfuscation Executive / Kelly Heffner
Author Index
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
54.

図書

図書
Erland Jonsson, Alfonso Valdes, Magnus Almgren (eds.)
出版情報: Berlin : Springer, c2004  xii, 314 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3224
所蔵情報: loading…
55.

図書

図書
edited by Sushil Jajodia, Leon Strous
出版情報: Boston : Kluwer Academic, 2004  viii, 253 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 140
所蔵情報: loading…
56.

図書

図書
ACM SIGKDD International Workshop on Knowledge Discovery from Uncertain Data ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  61 p. ; 28 cm
所蔵情報: loading…
57.

図書

図書
Workshop on Social Network Mining and Analysis ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  87 p. ; 28 cm
所蔵情報: loading…
58.

図書

図書
ACM SIGKDD Workshop on Visual Analysis and Knowledge Discovery ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  92 p. ; 28 cm
所蔵情報: loading…
59.

図書

図書
ACM Workshop on Scalable Trusted Computing ; ACM Conference on Computer and Communications Security
出版情報: New York, NY : Association for Computing Machinery, c2009  72 p. ; 28 cm
所蔵情報: loading…
60.

図書

図書
ACM Workshop on Digital Identity Management ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York : Association for Computing Machinery, c2009  84 p. ; 28 cm
所蔵情報: loading…
61.

図書

図書
ACM Workshop on Privacy in the Electronic Society ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; ACM Conference on Computer and Communications Security
出版情報: New York : Association for Computing Machinery, c2009  120 p. ; 28 cm
所蔵情報: loading…
62.

図書

図書
ACM SIGPLAN/SIGSOFT International Conference on Generative Programming and Component Engineering ; ACM Special Interest Group in Programming Languages ; Object-Oriented Programming Systems, Languages and Applications
出版情報: New York : Association for Computing Machinery, c2009  187 p. ; 28 cm
所蔵情報: loading…
63.

図書

図書
editors, Rei Safavi-Naini ...[et al.]
出版情報: New York, NY : Associations for Computing Machinery, c2009  391 p. ; 28 cm
所蔵情報: loading…
64.

図書

図書
ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  ix, 90 p. ; 28 cm
所蔵情報: loading…
65.

図書

図書
Howard Heys, Carlisle Adams (eds.)
出版情報: Berlin : Springer, c2000  viii, 241 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1758
所蔵情報: loading…
66.

図書

図書
Andreas Pfitzmann (ed.)
出版情報: Berlin : Springer, c2000  ix, 492 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1768
所蔵情報: loading…
目次情報: 続きを見る
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
Steganography: Paradigms and Examples
Steganography Secure against Cover-Stego-Attacks / Elke Franz ; Andreas Pfitzmann
Secure Steganographic Methods for Palette Images / Jiri Fridrich ; Rui Du
Attacks on Steganographic Systems / Andreas Westfeld
Beyond Symmetric Steganography
Developments in Steganography / Joshua R. Smith ; Chris Dodge
An Asymmetric Public Detection Watermarking Technique / Teddy Furon ; Pierre Duhamel
Zero Knowledge Watermark Detection / Scott Craver
Watermarking: Proving Ownership
Proving Ownership of Digital Content / André Adelsbach ; Birgit Pfitzmann ; Ahmad-Reza Sadeghi
Error- and Collusion-Secure Fingerprinting for Digital Data / Hans-Jürgen Guth
Watermarking: Detection and Decoding
Computing the Probability of False Watermark Detection / Matt L. Miller ; Jeffrey A. Bloom
Optimum Decoding of Non-additive Full Frame DFT Watermarks / Alessia De Rosa ; Mauro Barni ; Franco Bartolini ; Vito Cappellini ; Alessandro Piva
Watermark Detection after Quantization Attacks / Joachim J. Eggers ; Bernd Girod
Content-Based Watermarking for Image Authentication / Pedro Lamy ; José Martinho ; Tiago Rosa ; Maria Paula Queluz
Watermarking: Embedding Techniques
Fast Robust Template Matching for Affine Resistant Image Watermarks / Shelby Pereira ; Thierry Pun
A Stochastic Approach to Content Adaptive Digital Image Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Nazanin Baumgaertner
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation / Martin Kutter
Watermarking: New Designs and Applications
On the Design of a Watermarking System: Considerations and Rationales / Jean-Paul Linnartz ; Geert Depovere ; Ton Kalker
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking / Gabriella Csurka ; Frédéric Deguillaume ; Joseph J. K. Ó Ruanaidh
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware / John Lach ; William H. Mangione-Smith ; Miodrag Potkonjak
Watermarking: Improving Robustness
Robust Watermarking for Images Based on Color Manipulation / Sebastiano Battiato ; Dario Catalano ; Giovanni Gallo ; Rosario Gennaro
Recovery of Watermarks from Distorted Images / Neil F. Johnson ; Zoran Duric ; Sushil Jajodia
Cocktail Watermarking on Images / Chun-Shien Lu ; Hong-Yuan Mark Liao ; Shih-Kun Huang ; Chwen-Jye Sze
Watermarking and Software Protection
Hiding Signatures in Graph Coloring Solutions / Gang Qu
Robust Object Watermarking: Application to Code / Julien P. Stern ; Gaël Hachez ; François Koeune ; Jean-Jacques Quisquater
Software DisEngineering: Program Hiding Architecture and Experiments / Enriquillo Valdez ; Moti Yung
The Difficulty of Separating Private and Public Information
Chaffing at the Bit: Thoughts on a Note by Ronald Rivest / John McHugh
An Entropy-Based Framework for Database Inference / Ira S. Moskowitz ; LiWu Chang
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms / Talat Mert DoGu ; Anthony Ephremides
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast / Frank Stajano ; Ross Anderson
Stego-Engineering
Protecting Secret Keys in a Compromised Computational System / W. P. R. Mitchell
StegFS: A Steganographic File System for Linux / Andrew D. McDonald ; Markus G. Kuhn
Nonbinary Audio Cryptography / Yvo Desmedt ; Tri V. Le
Author Index
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
67.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2000  xi, 483 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1751
所蔵情報: loading…
目次情報: 続きを見る
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
Some Remarks on a Fair Exchange Protocol / Jianying Zhou ; Robert Deng ; Feng Bao
An Identification Scheme Based on Sparse Polynomials / Seigo Arita ; William D. Banks ; Daniel Lieman ; Igor E. Shparlinski
A State-Based Model for Certificate Management Systems / Chuchang Liu ; Maris A. Ozols ; Marie Henderson ; Tony Cant
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence / Reto Kohlas ; Ueli Maurer
The Composite Discrete Logarithm and Secure Authentication / David Pointcheval
Chosen-Ciphertext Security for Any One-Way Cryptosystem
Short Proofs of Knowledge for Factoring / Guillaume Poupard ; Jacques Stern
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms / X.Y.Wang ; L.C.Hui ; K.P.Chow ; W.W.Tsang ; C.F.Chong ; H.W.Chan
All-or-Nothing Transform and Remotely Keyed Encryption Protocols / Sang Uk Shin ; Weon Shin ; Kyung Hyune Rhee
Security of Public Key Certificate Based Authentication Protocols / Wu Wen ; Takamichi Saito ; Fumio Mizoguchi
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2 / Tetsuya Izu ; Jun Kogure ; Kazuhiro Yokoyama
Key Recovery in Third Generation Wireless Communication Systems / Juanma González Nieto ; DongGook Park ; Colin Boyd ; Ed Dawson
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications / Katsuyuki Okeya ; Hiroyuki Kurumatani ; Kouichi Sakurai
Certificates of Recoverability with Scalable Recovery Agent Security / Eric R. Verheul
Design Validations for Discrete Logarithm Based Signature Schemes / Ernest Brickell ; Serge Vaudenay ; Moti Yung
Optimally Efficient Accountable Time-Stamping / Ahto Buldas ; HelgerLipmaa ; Berry Schoenmakers
"Pseudorandom Intermixing": A Tool for Shared Cryptography / YairFankel ; Philip MacKenzie
RSA-Based Auto-recoverable Cryptosystems / Adam Young
Efficient and Fresh Certification / Irene Gassko ; Peter S. Gemmell
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions / Ronald Cramer ; ard
Cryptographic Approaches to Privacy in Forensic DNA Databases / Philip Bohannon ; Markus Jakobsson ; Sukamol Srikwan
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes / Toru Inoue
An Auction Protocol Which Hides Bids of Losers / Chae Hoon Lim ; Hyo Sun Hwang ; Kazue Sako
Forward Secrecy and Its Application to Future Mobile Communications Security / Sang-Jae Moon
Selecting Cryptographic Key Sizes / Arjen K. Lenstra
A Structured ElGamal-Type Multisignature Scheme / Mike Burmester ; Yvo Desmedt ; Hiroshi Doi ; Masahiro Mambo ; Eiji Okamoto ; Mitsuru Tada ; Yuko Yoshifuji
Author Index
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
68.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York, NY : Association for Computing Machinery, c2007  75 p. ; 28 cm
所蔵情報: loading…
69.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York, NY : Association for Computing Machinery, c2007  vii, 56 p. ; 28 cm
所蔵情報: loading…
70.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York, N.Y. : Association for Computing Machinery, c2007  vi, 92 p. ; 28 cm
所蔵情報: loading…
71.

図書

図書
ACM Workshop on Digital Identity Management ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York, N.Y. : Association for Computing Machinery, c2006  vi, 114 p. ; 28 cm
所蔵情報: loading…
72.

図書

図書
ACM Workshop on Quality of Protection ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York, NY : Association for Computing Machinery, c2006  60 p. ; 28 cm
所蔵情報: loading…
73.

図書

図書
ACM Workshop on Scalable Trusted Computing ; ACM Conference on Computer and Communications Security
出版情報: New York, NY : Association for Computing Machinery, c2006  56 p. ; 28 cm
所蔵情報: loading…
74.

図書

図書
International Workshop on Visualization for Computer Security ; ACM Conference on Computer and Communications Security
出版情報: New York, NY : Association for Computing Machinery, c2006  127 p. ; 28 cm
所蔵情報: loading…
75.

図書

図書
John A. Clark ... [et. al] (eds.)
出版情報: Berlin : Springer, c2006  x, 242 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3934
所蔵情報: loading…
76.

図書

図書
edited by Simone Fischer-Hübner ... [et al.]
出版情報: New York : Springer, c2006  xvi, 494 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 201
所蔵情報: loading…
目次情報: 続きを見る
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures / Jan Camenisch ; Dieter Sommer ; Roger Zimmermann
Security in Mobile and Ad Hoc Networks
Authenticated Query Flooding in Sensor Networks / Zinaida Benenson ; Felix C. Freiling ; Ernest Hammerschmidt ; Stefan Lucks ; Lexi Pimenidis
Identity Based Message Authentication for Dynamic Networks / Pietro Michiardi ; Refik Molva
Providing Authentication and Access Control in Vehicular Network Environment / Hasnaa Moustafa ; Gilles Bourdon ; Yvon Gourhant
Trust and Security Management
A Framework for Web Services Trust / Marijke Coetzee ; Jan Eloff
Trust: An Element of Security / Stephen Flowerday ; Rossouw von Solms
Security-by-Ontology: A Knowledge-Centric Approach / Bill Tsoumas ; Panagiotis Papagiannakopoulos ; Stelios Dritsas ; Dimitris Gritzalis
Privacy Enhancing Technologies II
A Methodology for Designing Controlled Anonymous Applications / Vincent Naessens ; Bart De Decker
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities / Sandra Steinbrecher
Protecting (Anonymous) Credentials with the Trusted Computing Group's Trusted Platform Modules V1.2
Attacks, Vulnerability Analysis, and Tools
Analysis and Improvement of Anti-Phishing Schemes / Dinei Florêncio ; Cormac Herley
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks / Kameswari Kotapati ; Peng Liu ; Thomas F. LaPorta
Protecting Web Services from DOS Attacks by SOAP Message Validation / Nils Gruschka ; Norbert Luttenberger
Access Control and Authentication I
A Flexible and Distributed Architecture to Enforce Dynamic Access Control / Thierry Sans ; Frédéric Cuppens ; Nora Cuppens-Boulahia
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications / Andreas Mattas ; Ioannins Mavridis ; Iason Pagkalos
CAS++: An Open Source Single Sign-on Solution for Secure E-services / Claudio Agostino Ardagna ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Fulvio Frati ; Pierangela Samarati
Security Protocols
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps / Jianying Zhou ; Jose A. Onieva ; Javier Lopez
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol / Michael Backes ; Birgit Pfitzmann
Sealed-Bid Micro Auctions / Kun Peng ; Colin Boyd ; Ed Dawson
Intrusion Detection
Detecting Known and Novel Network Intrusions / Yacine Bouzida
Evaluating Classifiers for Mobile-Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Mika Raento
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts / Xiaoxin Yin ; William Yurcik ; Adam Slagell
Usability and Awareness
A Usability Study of Security Policy Management / Almut Herzog ; Nahid Shahmehri
Considering the Usability of End-User Security Software / Steven Furnell ; Adila Jusoh ; Dimitris Katsabas ; Paul Dowland
Utilizing the Common Criteria for Advanced Student Research Projects / Thuy D. Nguyen ; Cynthia E. Irvine
Privacy Enhancing Technologies III
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems / Rafael Accorsi
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications / Huafei Zhu ; Tieyan Li ; Feng Bao
Access Control and Authentication II
Click Passwords / Darko Kirovski ; Nebojsa Jojic ; Paul Roberts
Cryptographically Enforced Personalized Role-Based Access Control / Milan Petkovic ; Claudine Conrado ; Malik Hammoutene
Access Control and Authentication III
Using VO Concept for Managing Dynamic Security Associations / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets / Martin Gilje Jaatun ; Inger Anne Tondel ; Frederic Paint ; Tor Hjalmar Johannessen ; John Charles Francis ; Claire Duranton
Forensics
Network Forensics on Packet Fingerprints / Chia Yuan Cho ; Sin Yeung Lee ; Chung Pheng Tan ; Yong Tai Tan
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages / Martin Karresand
IFIP WG 11.1/11.8 Security Culture Workshop
Organizational Security Culture: More Than Just an End-User Phenomenon / Anthonie B. Ruighaver ; Sean B. Maynard
Cyber Security Training and Awareness Through Game Play / Benjamin D. Cone ; Michael F. Thompson
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge / Omar Zakaria
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security / Jabiri Kuwe Bakari ; Charles N. Tarimo ; Christer Magnusson ; Louise Yngström
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment / Lynette Drevin ; Hennie Kruger ; Tjaart Steyn
Using Phishing for User Email Security Awareness / Ronald C. Dodge ; Aaron J. Ferguson
IFIP WG 11.4 I-NetSec'06 Workshop
Invited Talk: Anonymous Credentials: Opportunities and Challenges
Practical Private Regular Expression Matching / Florian Kerschbaum
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments / Siani Pearson ; Marco Casassa-Mont
The APROB-Channel: Adaptive Semi-Real-Time Anonymous Communication / Gergely Tóth ; Zoltán Hornák
Author Index
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
77.

図書

図書
Moti Yung ... [et al.] (eds.)
出版情報: Berlin : Springer, c2006  xiv, 542 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3958
所蔵情報: loading…
78.

図書

図書
Dongho Won, Seungjoo Kim (eds.)
出版情報: Berlin : Springer, c2006  xiv, 458 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3935
所蔵情報: loading…
79.

図書

図書
edited by Jaynarayan H. Lala ; [supported by] DARPA
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  xix, 435 p. ; 28 cm
所蔵情報: loading…
80.

図書

図書
[sponsored by IEEE Computer Society Task Force on Information Assurance, IEEE Computer Society Mass Storage Systems Technical Committee]
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2004  v, 78 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Decentralized Authentication Mechanisms for Object-Based Storage Devices / V. Kher ; Y. Kim
Fast and Secure Magnetic WORM Storage Systems / Y. Wang ; Y. Zheng
Key Management for Encrypted Data Storage in Distributed Systems / L. Seitz ; J.-M. Pierson ; L. Brunie
Information Security on the Logistical Network: An End-to-End Approach / M. Beck ; J. Plank ; J. Millar ; S. Atchley ; S. Soltesz ; A. Bassi ; H. Liu
Implementation of a Storage Mechanism for Untrusted DBMSs / E. Damiani ; S. di Vimercati ; M. Finetti ; S. Paraboschi ; P. Samarati ; S. Jajodia
Cryptographic File Systems Performance: What You Don't Know Can Hurt You / C. Wright ; J. Dave ; E. Zadok
Memories: A Survey of Their Secure Uses in Smart Cards / M. Neve ; E. Peeters ; D. Samyde ; J.-J. Quisquater
The Object Store Security Protocol / M. Factor ; D. Naor ; N. Rinetzky ; J. Satran ; D. Nagle ; D. Beaver ; E. Riede
IEEE Standard for Encrypted Storage / J. Hughes
Research and Implement of an Encrypted File System Used to NAS / H. Jianzhong ; X. Changsheng ; C. Bin
Author Index
Decentralized Authentication Mechanisms for Object-Based Storage Devices / V. Kher ; Y. Kim
Fast and Secure Magnetic WORM Storage Systems / Y. Wang ; Y. Zheng
Key Management for Encrypted Data Storage in Distributed Systems / L. Seitz ; J.-M. Pierson ; L. Brunie
81.

図書

図書
[editor, Oleg Stoukatch]
出版情報: Piscataway, NJ : IEEE, 2003  152 p. ; 20 cm
所蔵情報: loading…
82.

図書

図書
editor, Larry D. Sanson ; sponsored by IEEE Lexington Section USA ... [et al.] ; in association with Universidad de las Palmas de Gran Canaria, Gobierno de Canarias, SECURITAS
出版情報: Piscataway, NJ : IEEE, c2005  336 p. ; 28 cm
所蔵情報: loading…
83.

図書

図書
Dieter Gollmann, Jan Meier, Andrei Sabelfeld (eds.)
出版情報: Berlin : Springer, c2006  xi, 548 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4189
所蔵情報: loading…
84.

図書

図書
ACM Workshop on XML Security ; Association for Computing Machinery ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; ACM Conference on Computer and Communications Security
出版情報: New York, N.Y. : Association for Computing Machinery, c2004  vi, 121 p. ; 28 cm
所蔵情報: loading…
85.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York : ACM, 2004  vii, 148 p. ; 28 cm
所蔵情報: loading…
86.

図書

図書
[general chairs: Jana Dittmann ; program chairs: Jessica Fridrich]
出版情報: New York, NY : ACM Press, 2004  viii, 228 p. ; 28 cm
所蔵情報: loading…
87.

図書

図書
Sokratis K. Katsikas ... [et al.] (eds.)
出版情報: Berlin : Springer, c2006  xiv, 548 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4176
所蔵情報: loading…
目次情報: 続きを見る
Software Security
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie
Privacy and Anonymity
Low Latency Anonymity with Mix Rings / Matthew Burnside ; Angelos D. Keromytis
Breaking Four Mix-Related Schemes Based on Universal Re-encryption / George Danezis
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy / Maurizio Atzori
Protecting Data Privacy Through Hard-to-Reverse Negative Databases / Fernando Esponda ; Elena S. Ackley ; Paul Helman ; Haixia Jia ; Stephanie Forrest
Block Ciphers and Hash Functions
Related-Key Rectangle Attack on 42-Round SHACAL-2 / Jiqiang Lu ; Jongsung Kim ; Nathan Keller ; Orr Dunkelman
On the Collision Resistance of RIPEMD-160 / Florian Mendel ; Norbert Pramstaller ; Christian Rechberger ; Vincent Rijmen
Digital Signatures
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption / Javier Herranz ; Fabien Laguillaumie
Multi-party Concurrent Signatures / Dongvu Tonien ; Willy Susilo ; Reihaneh Safavi-Naini
Formal Security Model of Multisignatures / Yuichi Komano ; Kazuo Ohta ; Atsushi Shimbo ; Shinichi Kawamura
Cryptanalysis of Variants of UOV / Yuh-Hua Hu ; Chun-Yen Chou ; Lih-Ghung Wang ; Feipei Lai
Stream Ciphers
Trivium: a Stream Cipher Construction Inspired by Block Cipher Design Principles / Christophe De Canniere
Cryptanalysis of the Bluetooth E[subscrpit o] Cipher Using OBDD's / Yaniv Shaked ; Avishai Wool
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice / Ellen Jochemsz ; Benne de WegerEncryption I:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search / Joonsang Baek
Collusion-Free Policy-Based Encryption / Walid Bagga ; Refik Molva
Pervasive Computing
Using Multiple Smart Cards for Signing Messages at Malicious Terminals / Istvan Zsolt Berta
Diverging Keys in Wireless Sensor Networks / Michal Ren ; Tanmoy Kanti Das ; Jianying Zhou
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption / Ulrich Huber ; Ahmad-Reza SadeghiEncryption II:
Transparent Image Encryption Using Progressive JPEG / Thomas Stutz ; Andreas Uhl
Network Security
Preserving TCP Connections Across Host Address Changes / Vassilis Prevelakis ; Sotiris Ioannidis
A Security Architecture for Protecting LAN Interactions / Andre Zuquete ; Hugo Marques
Simulation of Internet DDoS Attacks and Defense / Igor Kotenko ; Alexander Ulanov
Snooze: Toward a Stateful NetwOrk prOtocol fuzZEr / Greg Banks ; Marco Cova ; Viktoria Felmetsger ; Kevin Almeroth ; Richard Kemmerer
Watermarking and DRM
Rights Protection for Data Cubes / Jie Guo ; Yingjiu Li ; Robert H. Deng ; Kefei Chen
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) / Huifang Yin ; Jun Li
Intrusion Detection and Worms
Resistance Analysis to Intruders' Evasion of Detecting Intrusion / Jianhua Yang ; Yongzhong Zhang ; Shou-Hsuan Stephen Huang
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks / Luciano Bononi ; Carlo Tacconi
Anomaly Intrusion Detection Based on Clustering a Data Stream / Sang-Hyun Oh ; Jin-Suk Kang ; Yung-Cheol Byun ; Taikyeong T. Jeong ; Won-Suk Lee
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation / K. Anagnostakis ; S. Ioannidis ; A.D. Keromytis ; M.B. Greenwald
Key Exchange
An Authentication and Key Exchange Protocol for Secure Credential Services / SeongHan Shin ; Kazukuni Kobara ; Hideki Imai
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders / Yvo Desmedt ; Josef Pieprzyk ; Ron Steinfeld ; Huaxiong Wang
Security Protocols and Formal Methods
Formalising Receipt-Freeness / H.L. Jonker ; E.P. de Vink
Enhancing the Security and Efficiency of 3-D Secure / Mohammed Assora ; Ayoub Shirvani
Designing and Verifying Core Protocols for Location Privacy / David von Oheimb ; Jorge Cuellar
Information Systems Security
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches / Mila Katzarova ; Andrew Simpson
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness / Jose M Torres ; Jose M Sarriegi ; Javier Santos ; Nicolas Serrano
Author Index
Software Security
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie
88.

図書

図書
Min Surp Rhee, Byoungcheon Lee (eds.)
出版情報: Berlin : Springer, c2006  xiii, 358 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4296
所蔵情報: loading…
89.

図書

図書
George Danezis, Philippe Golle (eds.)
出版情報: Berlin : Springer, 2006  viii, 429 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4258
所蔵情報: loading…
90.

図書

図書
Workshop on Software Engineering for Secure Systems ; International Conference on Software Engineering
出版情報: New York, N.Y. : Association for Computing Machinery, c2005  128 p. ; 28 cm
所蔵情報: loading…
91.

図書

図書
ACM Symposium on Information, Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York, NY : Associations for Computing Machinery, c2006  i, [12], 347 p. ; 28 cm
所蔵情報: loading…
92.

図書

図書
edited by Hein Venter ... [et al.]
出版情報: New York : Springer, c2007  xv, 498 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 232
所蔵情報: loading…
目次情報: 続きを見る
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Human-Computer Interaction I
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri
Computer-Based Trust
Trusted Ticket Systems and Applications / Andreas U. Schmidt ; Nicolai Kuntze
Trust Evaluation for Web Applications based on Behavioral Analysis / Luiz da Costa Carmo ; Breno de Oliveira ; Augusto Braga
Information Security Management I
Improving the Information Security Model by using TFI / Rose-Mharie Ahlfeldt ; Paolo Spagnoletti ; Guttorm Sindre
Ontological Mapping of Common Criteria's Security Assurance Requirements / Andreas Ekelhart ; Stefan Fenz ; Gernot Goluch ; Edgar Weippl
Network Security I
Management of Exceptions on Access Control Policies / Joaquin Garcia-Alfaro ; Frederic Cuppens ; Nora Cuppens-Boulahia
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols / Tieyan Li ; Guilin Wang
Information Security Management II
Exploratory Survey on an Evaluation Model for a Sense of Security / Natsuko Hikage ; Yuko Murayama ; Carl Hauser
Employees' Adherence to Information Security Policies: An Empirical Study / Mikko Siponen ; Seppo Pahnila ; Adam Mahmood
Network Security II
Phishing in the Wireless: Implementation and Analysis / Ivan Martinovic ; Frank Zdarsky ; Adam Bachorek ; Christian Jung ; Jens Schmitt
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks / Tyler Moore ; Jolyon Clulow
Access Control I
A Credential-Based System for the Anonymous Delegation of Rights / Liesje Demuynck ; Bart De Decker ; Wouter Joosen
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content / Christian Josef Eibl ; S.H. Basie von Solms ; Sigrid Schubert
Human-Computer Interaction II
Identity Theft - Empirical Evidence from a Phishing Exercise / Tjaart Steyn ; Hennie Kruger ; Lynette Drevin
A Practical Usability Evaluation of Security Features in End-User Applications / Steven Furnell ; Dimitris Katsabas ; Paul Dowland ; Fraser Reid
Intrusion Detection Systems
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis / Maciej Rossudowski ; Hein Venter ; Jan Eloff
A Survey of Bots Used for Distributed Denial of Service Attacks / Vrizlynn Thing ; Morris Sloman ; Naranker Dulay
Access Control II
A Hybrid PKI-IBC Based Ephemerizer System / Srijith Nair ; Mohammad Dashti ; Bruno Crispo ; Andrew Tanenbaum
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices / Sevasti Karatzouni ; Nathan Clarke
Information Privacy I
Security Remarks on a Convertible Nominative Signature Scheme / Feng Bao
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions / Alapan Arnab ; Andrew Hutchison
Access Control III
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation / Evangelos Kotsovinos ; Ingo Friese ; Martin Kurze ; Jorg Heuer
Extending Role Based Access Control Model for Distributed Multidomain Applications / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Information Privacy II
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy / Claudio Ardagna ; Marco Cremonini ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Pierangela Samarati
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning / Jan Zibuschka ; Lothar Fritsch ; Mike Radmacher ; Tobias Scherner ; Kai Rannenberg
Access Control IV
Crafting Web Counters into Covert Channels / Xiapu Luo ; Edmond Chan ; Rocky Chang
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM / Thierry Sans
Security Services
Non-Repudiation in Internet Telephony / Andreas Schmidt ; Christian Hett
FirePatch: Secure and Time-Critical Dissemination of Software Patches / Havard Johansen ; Dag Johansen ; Robbert van Renesse
Access Control V
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing / Sara Foresti ; Sushil Jajodia ; Stefano Paraboschi
Building a Distributed Semantic-aware Security Architecture / Jan Kolter ; Rolf Schillinger ; Gunther Pernul
Trust and Intrusion Detection Systems
Using Trust to Resist Censorship in the Presence of Collusion / Andriy Panchenko ; Lexi Pimenidis
Evaluating the Effects of Model Generalization on Intrusion Detection Performance / Zhuowei Li ; Amitabha Das ; Jianying Zhou
Keynote paper
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM / William Caelli
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
Covert Identity Information in Direct Anonymous Attestation (DAA) / Carsten Rudolph
Safeguarding Personal Data using Rights Management in Distributed Applications / Adolf Hohl ; Alf Zugenmaier
Identification Now and in the Future: Social Grant Distribution Process in South Africa / Stephen Flowerday ; Gideon Ranga
Hard-drive Disposal and Identity Fraud / Paula Thomas ; Theodore Tryfonas
An analysis of security and privacy issues relating to RFID enabled ePassports / Eleni Kosta ; Martin Meints ; Marit Hansen ; Mark Gasson
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework / Nicholas Tate ; Sharman Lichtenstein ; Matthew Warren
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program / Tatjana Welzer ; Marko Holbl ; Ana Habjanic ; Bostjan Brumen ; Marjan Druzovec
Remote Virtual Information Assurance Network / Ronald Dodge ; Corey Bertram ; Daniel Ragsdale
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model / Kara Nance ; Brian Hay
Author Index
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
93.

図書

図書
Rune Winther, BjØrn Axel Gran, Gustav Dahll (eds.)
出版情報: Berlin : Springer, c2005  xiii, 404 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3688
所蔵情報: loading…
94.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2005  viii, 302 p. ; 28 cm
所蔵情報: loading…
95.

図書

図書
Shai Halevi, Tal Rabin (eds.)
出版情報: Berlin : Springer, c2006  xi, 616 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3876
所蔵情報: loading…
96.

図書

図書
Alfred Menezes (ed.)
出版情報: Berlin : Springer, c2005  x, 383 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3376
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
Sub-linear Queries Statistical Databases: Privacy with Power / Cynthia Dwork
Malicious Cryptography: Kleptographic Aspects / Adam Young ; Moti Yung
Cryptanalysis
Resistance of SNOW 2.0 Against Algebraic Attacks / Olivier Billet ; Henri Gilbert
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes / An Braeken ; Christopher Wolf ; Bart Preneel
Hold Your Sessions: An Attack on Java Session-Id Generation / Zvi Gutterman ; Dahlia Malkhi
Update on SHA-1 / Vincent Rijmen ; Elisabeth Oswald
A Fast Correlation Attack on the Shrinking Generator / Bin Zhang ; Hongjun Wu ; Dengguo Feng ; Feng Bao
Public-Key Encryption
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption / Dan Boneh ; Jonathan Katz
A Generic Conversion with Optimal Redundancy / Yang Cui ; Kazukuni Kobara ; Hideki Imai
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 / Nick Howgrave-Graham ; Joseph H. Silverman ; William Whyte
Signature Schemes
Foundations of Group Signatures: The Case of Dynamic Groups / Mihir Bellare ; Haixia Shi ; Chong Zhang
Time-Selective Convertible Undeniable Signatures / Fabien Laguillaumie ; Damien Vergnaud
Design Principles
On Tolerant Cryptographic Constructions / Amir Herzberg
Password-Based Protocols
Simple Password-Based Encrypted Key Exchange Protocols / Michel Abdalla ; David Pointcheval
Hard Bits of the Discrete Log with Applications to Password Authentication / Philip Mackenzie ; Sarvar Patel
Proofs for Two-Server Password Authentication / Michael Szydlo ; Burton Kaliski
Design and Analysis of Password-Based Key Derivation Functions / Frances F. Yao ; Yiqun Lisa Yin
Pairings
A New Two-Party Identity-Based Authenticated Key Agreement / Noel McCullagh ; Paulo S.L.M. Barreto
Accumulators from Bilinear Pairings and Applications / Lan Nguyen
Computing the Tate Pairing / Michael Scott
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings / Tsz Hon Yuen ; Victor K. Wei
Efficient and Secure Implementation
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box / Nele Mentens ; Lejla Batina ; Ingrid Verbauwhede
CryptoGraphics: Secret Key Cryptography Using Graphics Cards / Debra L. Cook ; John Ioannidis ; Angelos D. Keromytis ; Jake Luck
Side-Channel Leakage of Masked CMOS Gates / Stefan Mangard ; Thomas Popp ; Berndt M. Gammel
New Minimal Weight Representations for Left-to-Right Window Methods / James A. Muir ; Douglas R. Stinson
Author Index
Invited Talks
Sub-linear Queries Statistical Databases: Privacy with Power / Cynthia Dwork
Malicious Cryptography: Kleptographic Aspects / Adam Young ; Moti Yung
97.

図書

図書
Gabor Karsai, Eelco Visser (eds.)
出版情報: Berlin : Springer, c2004  xiii, 490 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3286
所蔵情報: loading…
98.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c2000  ix, 285 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Program Committee
Cover Photo
Names and Certificates
Local Names In SPKI/SDSI / N. Li
Reasoning about Trust and Insurance in a Public Key Infrastructure / J. Millen ; R. Wright
Strands and Multiset Rewriting
Protocol Independence through Disjoint Encryption / J. Guttman ; F. J. Thayer
Relating Strands and Multiset Rewriting for Security Protocol Analysis / I. Cervesato ; N. Durgin ; J. Mitchell ; P. Lincoln ; A. Scedrov
Optimizing Protocol Rewrite Rules of CIL Specifications / G. Denker ; A. Grau ; J. Filipe
Automated Security Protocol Methods
Looking for Diamonds in the Desert--Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols / A. Perrig ; D. Song
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis / A. Dekker
An Executable Specification Language for Planning Attacks to Security Protocols / L. Aiello ; F. Massacci
Panel
Foundations for Intrusion Detection? / T. Lunt
Network Security
Analyzing Single-Server Network Inhibition / T. Aura ; M. Bishop ; D. Sniegowski
Reasoning about Secrecy for Active Networks / P. Kakkar ; C. Gunter ; M. Abadi
Invariants, Induction, Ranks, Languages, and Ideals
Towards Automatic Verification of Authentication Protocols on an Unbounded Network / J. Heather ; S. Schneider
TAPS: A First-Order Verifier for Cryptographic Protocols / E. Cohen
Invariant Generation Techniques in Cryptographic Protocol Analysis / C. Meadows
Noninterference and Information Flow
Information Flow Analysis in a Discrete-Time Process Algebra / R. Focardi ; R. Gorrieri ; F. Martinelli
Possibilistic Definitions of Security--An Assembly Kit / H. Mantel
Probabilistic Noninterference for Multi-Threaded Programs / A. Sabelfeld ; D. Sands
Invited Talk
Lorenz and Colossus / A. Sale
Java and Mobile Code Security
An Operational Semantics of Java 2 Access Control / G. Karjoth
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol / M. Dam ; P. Giambiagi
Types and Language-Based Security
Secure Introduction of One-Way Functions / D. Volpano
How to Prevent Type Flaw Attacks on Security Protocols / G. Lowe
Secure Composition of Untrusted Code: Wrappers and Causality Types / P. Sewell ; J. Vitek
Author Index
Preface
Program Committee
Cover Photo
99.

図書

図書
Frédéric Cuppens ... [et al.]
出版情報: Berlin : Springer, c2000  x, 323 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1895
所蔵情報: loading…
100.

図書

図書
Hervé Debar, Ludovic Mé, S. Felix Wu (eds.)
出版情報: Berlin : Springer, c2000  x, 225 p. ; ill. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1907
所蔵情報: loading…
目次情報: 続きを見る
Logging
Better Logging through Formality / Chapman Flack ; Mikhail J. Atallah
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions / Josué Kuri ; Gonzalo Navarro ; Ludovic Mé ; Laurent Heye
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection / Joachim Biskup ; Ulrich Flegel
Data Mining
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions / Wenke Lee ; Rahul A. Nimbalkar ; Kam K. Yee ; Sunil B. Patil ; Pragneshkumar H. Desai ; Thuan T. Tran ; Salvatore J. Stolfo
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report / Christoph Michael ; Anup Ghosh
Modeling Process Behavior
Adaptive, Model-Based Monitoring for Cyber Attack Detection / Alfonso Valdes ; Keith Skinner
A Real-Time Intrusion Detection System Based on Learning Program Behavior / Anup K. Ghosh ; Michael Schatz
Intrusion Detection Using Variable-Length Audit Trail Patterns / Andreas Wespi ; Marc Dacier ; Hervé Debar
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects / Zakia Marrakchi ; Bernard Vivinis ; Benjamin Morin
IDS Evaluation
The 1998 Lincoln Laboratory IDS Evaluation (A Critique) / John McHugh
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation / Richard Lippmann ; Joshua W. Haines ; David J. Fried ; Jonathan Korba ; Kumar Das
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems / Dominique Alessandri
Modeling
LAMBDA: A Language to Model a Database for Detection of Attacks / Frederic Cuppens ; Rodolphe Ortalo
Target Naming and Service Apoptosis / James Riordan
Author Index
Logging
Better Logging through Formality / Chapman Flack ; Mikhail J. Atallah
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions / Josué Kuri ; Gonzalo Navarro ; Ludovic Mé ; Laurent Heye
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼