Software Security |
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna |
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie |
Privacy and Anonymity |
Low Latency Anonymity with Mix Rings / Matthew Burnside ; Angelos D. Keromytis |
Breaking Four Mix-Related Schemes Based on Universal Re-encryption / George Danezis |
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy / Maurizio Atzori |
Protecting Data Privacy Through Hard-to-Reverse Negative Databases / Fernando Esponda ; Elena S. Ackley ; Paul Helman ; Haixia Jia ; Stephanie Forrest |
Block Ciphers and Hash Functions |
Related-Key Rectangle Attack on 42-Round SHACAL-2 / Jiqiang Lu ; Jongsung Kim ; Nathan Keller ; Orr Dunkelman |
On the Collision Resistance of RIPEMD-160 / Florian Mendel ; Norbert Pramstaller ; Christian Rechberger ; Vincent Rijmen |
Digital Signatures |
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption / Javier Herranz ; Fabien Laguillaumie |
Multi-party Concurrent Signatures / Dongvu Tonien ; Willy Susilo ; Reihaneh Safavi-Naini |
Formal Security Model of Multisignatures / Yuichi Komano ; Kazuo Ohta ; Atsushi Shimbo ; Shinichi Kawamura |
Cryptanalysis of Variants of UOV / Yuh-Hua Hu ; Chun-Yen Chou ; Lih-Ghung Wang ; Feipei Lai |
Stream Ciphers |
Trivium: a Stream Cipher Construction Inspired by Block Cipher Design Principles / Christophe De Canniere |
Cryptanalysis of the Bluetooth E[subscrpit o] Cipher Using OBDD's / Yaniv Shaked ; Avishai Wool |
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice / Ellen Jochemsz ; Benne de WegerEncryption I: |
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search / Joonsang Baek |
Collusion-Free Policy-Based Encryption / Walid Bagga ; Refik Molva |
Pervasive Computing |
Using Multiple Smart Cards for Signing Messages at Malicious Terminals / Istvan Zsolt Berta |
Diverging Keys in Wireless Sensor Networks / Michal Ren ; Tanmoy Kanti Das ; Jianying Zhou |
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption / Ulrich Huber ; Ahmad-Reza SadeghiEncryption II: |
Transparent Image Encryption Using Progressive JPEG / Thomas Stutz ; Andreas Uhl |
Network Security |
Preserving TCP Connections Across Host Address Changes / Vassilis Prevelakis ; Sotiris Ioannidis |
A Security Architecture for Protecting LAN Interactions / Andre Zuquete ; Hugo Marques |
Simulation of Internet DDoS Attacks and Defense / Igor Kotenko ; Alexander Ulanov |
Snooze: Toward a Stateful NetwOrk prOtocol fuzZEr / Greg Banks ; Marco Cova ; Viktoria Felmetsger ; Kevin Almeroth ; Richard Kemmerer |
Watermarking and DRM |
Rights Protection for Data Cubes / Jie Guo ; Yingjiu Li ; Robert H. Deng ; Kefei Chen |
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) / Huifang Yin ; Jun Li |
Intrusion Detection and Worms |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion / Jianhua Yang ; Yongzhong Zhang ; Shou-Hsuan Stephen Huang |
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks / Luciano Bononi ; Carlo Tacconi |
Anomaly Intrusion Detection Based on Clustering a Data Stream / Sang-Hyun Oh ; Jin-Suk Kang ; Yung-Cheol Byun ; Taikyeong T. Jeong ; Won-Suk Lee |
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation / K. Anagnostakis ; S. Ioannidis ; A.D. Keromytis ; M.B. Greenwald |
Key Exchange |
An Authentication and Key Exchange Protocol for Secure Credential Services / SeongHan Shin ; Kazukuni Kobara ; Hideki Imai |
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders / Yvo Desmedt ; Josef Pieprzyk ; Ron Steinfeld ; Huaxiong Wang |
Security Protocols and Formal Methods |
Formalising Receipt-Freeness / H.L. Jonker ; E.P. de Vink |
Enhancing the Security and Efficiency of 3-D Secure / Mohammed Assora ; Ayoub Shirvani |
Designing and Verifying Core Protocols for Location Privacy / David von Oheimb ; Jorge Cuellar |
Information Systems Security |
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches / Mila Katzarova ; Andrew Simpson |
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness / Jose M Torres ; Jose M Sarriegi ; Javier Santos ; Nicolas Serrano |
Author Index |
Software Security |
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna |
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie |