Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
Encrypted Watermarks and Linux Laptop Security / Markku-Juhani O. Saarinen
Inconsistency Detection of Authorization Policies in Distributed Component Environment / Chang-Joo Moon ; Hoh Peter In
Public Key Schemes I
Custodian-Hiding Verifiable Encryption / Joseph K. Liu ; Victor K. Wei ; Duncan S. Wong
Proving Key Usage / Malek Bechlaghem ; Vincent Rijmen
Public Key Encryption with Conjunctive Field Keyword Search / Dong Jin Park ; Kihyun Kim ; Pil Joong Lee
Intrusion Detection I
A Probabilistic Method for Detecting Anomalous Program Behavior / Kohei Tatara ; Toshihiro Tabata ; Kouichi Sakurai
Service Discrimination and Audit File Reduction for Effective Intrusion Detection / Fernando Godínez ; Dieter Hutter ; Raúl Monroy
IDS False Alarm Filtering Using KNN Classifier / Kwok Ho Law ; Lam For Kwok
Watermarking/Anti-spamming
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking / Hae-Yeoun Lee ; Jong-Tae Kim ; Heung-Kyu Lee ; Young-Ho Suh
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment / Manabu Iwanaga
Public Key Schemes II
Efficient Authenticated Key Agreement Protocol for Dynamic Groups / Kui Ren ; Hyunrok Lee ; Kwangjo Kim ; Taewhan Yoo
A Ring Signature Scheme Using Bilinear Pairings / Jing Xu ; Zhenfeng Zhang ; Dengguo Feng
Verifiable Pairing and Its Applications / Sherman S.M. Chow
Intrusion Detection II
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading / Bart Haagdorens ; Tim Vermeiren ; Marnix Goossens
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks / Seok Bong Jeong ; Young Woo Choi ; Sehun Kim
Application of Content Computing in Honeyfarm / Yi-Yuan Huang ; Kwok-Yan Lam ; Siu-Leung Chung ; Chi-Hung Chi ; Jia-Guang Sun
Digital Rights Management
License Protection with a Tamper-Resistant Token / Cheun Ngen Chong ; Bin Ren ; Jeroen Doumen ; Sandro Etalle ; Pieter H. Hartel ; Ricardo Corin
An Adaptive Approach to Hardware Alteration for Digital Rights Management / Yinyan Yu ; Zhi Tang
Dynamic Fingerprinting over Broadcast Using Revocation Scheme / Mira Kim ; Kazukuni Kobara ; Hideki Imai
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels / Chong Hee Kim ; Yong Ho Hwang
e-Commerce Security
Vulnerability of a Mobile Payment System Proposed at WISA 2002 / Sang Cheol Hwang ; Dong Hoon Lee ; Daewan Han ; Jae-Cheol Ryou
Fair Offline Payment Using Verifiable Encryption / Sangjin Kim ; Heekuck Oh
A Limited-Use Key Generation Scheme for Internet Transactions / Supakorn Kungpisdan ; Phu Dung Le ; Bala Srinivasan
Efficient Implementation
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes / Kishan Chand Gupta ; Palash Sarkar
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II / Soonhak Kwon
Hyperelliptic Curve Coprocessors on a FPGA / HoWon Kim ; Thomas Wollinger ; YongJe Choi ; KyoIl Chung ; Christof Paar
Anonymous Communication
Key-Exchange Protocol Using Pre-agreed Session-ID / Kenji Imamoto
A New k-Anonymous Message Transmission Protocol / Gang Yao
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack / Marcin Gomulkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
Side-Channel Attacks
Side Channel Cryptanalysis on SEED / HyungSo Yoo ; ChangKyun Kim ; JaeCheol Ha ; SangJae Moon ; IlHwan Park
Secure and Efficient AES Software Implementation for Smart Cards / Elena Trichina ; Lesya Korkishko
Practical Template Attacks / Christian Rechberger ; Elisabeth Oswald
Evaluation and Improvement of the Tempest Fonts / Hidema Tanaka ; Osamu Takizawa ; Akihiro Yamamura
Author Index
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
Device Security
Application Management Framework in User Centric Smart Card Ownership Model / Raja Naeem Akram ; Konstantinos Markantonakis ; Keith Mayes
PUF-Based Authentication Protocols - Revisited / Heike Busch ; Stefan Kaizenbeisser ; Paul Baecher
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application / Luan Ibraimi ; Milan Petkovic ; Svetla Nikova ; Pieter Hartel ; Willem Jonker
Network Security
Securing Remote Access Inside Wireless Mesh Networks / Mark Manulis
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers / Dae Hyun Yum ; Sun Young Kim ; HoKun Moon ; Mi-Yeon Kim ; Jae-Hoon Roh ; Pil Joong Lee
USN Middleware Security Model / Mijoo Kim ; Mi Yeon Yoon ; Heung Youl Youm
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs / Chae Hoon Lim
Author Index
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Brief Announcement: Fast Convergence in Route-Preservation / Jorge A. Cobb
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure / S. Dov Gordon ; Jonathan Katz ; Ranjit Kumaresan ; Arkady Yerukhimovich
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks / Tuan Manh Vu ; Reihaneh Safavi-Naini ; Carey Williamson
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses / Mahesh Arumugam ; Murat Demirbas ; Sandeep S. Kulkarni
Modeling and Analyzing Periodic Distributed Computations / Anurag Agarwal ; Vijay K. Garg ; Vinit Ogale
Complexity Issues in Automated Model Revision without Explicit Legitimate State / Fuad Abujarad
Algorithmic Verification of Population Protocols / Ioannis Chatzigiannakis ; Othon Michail ; Paul G. Spirakis
Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks / Bo Zhang ; Robert Simon ; Hakan Aydin
Stably Decidable Graph Languages by Mediated Population Protocols
Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping / Evangelos Kranakis ; Michel Paquette
Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage / Matthew P. Johnson ; Amotz Bar-Noy ; Mani Srivastava
Brief Announcement: On the Hardness of Topology Inference / H.B. Acharya ; Mohamed Gouda
A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing Era / Ji Lu ; Yaoxue Zhang ; Yuezhi Zhou
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks / Pierre Leone ; Marina Papatriantafilou ; Elad M. Schiller ; Gongxi Zhu
A Comparative Study of Rateless Codes for P2P Persistent Storage / Heverson B. Ribeiro ; Emmanuelle Anceaume
Dynamically Reconfigurable Filtering Architectures / Mathieu Valero ; Luciana Arantes ; Pierre Sens
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems / Yaser Houri ; Bernhard Amann ; Thomas Fuhrmann
A Framework for Secure and Private P2P Publish/Subscribe / Samuel Bernard
Snap-Stabilizing Linear Message Forwarding / Alain Cournier ; Anissa Lamani ; Franck Petit ; Vincent Villain
Vulnerability Analysis of High Dimensional Complex Systems / Vedant Misra ; Dion Harmon ; Yaneer Bar-Yam
Storage Capacity of Labeled Graphs / Dana Angluin ; James Aspnes ; Rida A. Bazzi ; Jiang Chen ; David Eisenstat ; Goran Konjevod
Safe Flocking in Spite of Actuator Faults / Taylor Johnson ; Sayan Mitra
Author Index
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains / Colin D. Walter
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs / Boufeldja Allailou ; Abdelaziz Marjane ; Abdellah Mokrane
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices / Erich Wenger ; Martin Feldhofer ; Nobert Felber
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling / Takehiko Amaki ; Masanori Hashimoto ; Yukio Mitsuyama ; Takao Onoye
Mobile Security/Secure Coding
Using Special Use Cases for Security in the Software Development Life Cycle / Jean-Marie Kabasele Tenday
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Atsuko Miyaji ; Kazumasa Omote
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6 / Jae-hoon Jang ; Don-Gu Yeo ; Dong-hee Lee ; Heung-Youl Youm
Hidden Credential Retrieval without Random Oracles / Mohammad Shahriar Rahman ; Masakazu Soshi
Correlation Power Analysis Based on Switching Glitch Model / Hongying Liu ; Guoyu Qian ; Satoshi Goto ; Yukiyasu Tsunoo
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity / Nico Döttling ; Dejan Lazich ; Jörn Müller-Quade ; Antonio Sobreira de Almeida
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks / Kehua Bao ; Zhenfeng Zhang
Full-Round Differential Attact on TWIS Block Clipher / Bozhan Su ; Wenling Wu ; Lei Zhang ; Yanjun Li
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations / Jean-François Gallais ; Ilya Kizhvatov ; Michael Tunstall
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis / Daisuke Nakatsu ; Yang Li ; Kazuo Sakiyama ; Kazuo Ohta
Biometrics
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram / Hansung Lee ; Yunsu Chung ; Jeongnyeo Kim ; Daihee Park
Fingerprint Liveness Detection Based on Multiple Image Quality Features / Changlong Jin ; Shengazhe Li ; Hakil Kim ; Ensoo Park
Robust Feature Extraction for Facial Image Quality Assessment / Thi Hai Binh Nguyen ; Van Huan Nguyen
Secure Protocol
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother / Rafael Dowsley ; Goichiro Hanaoka ; Hideki Imai ; Anderson C.A. Nascimento
Cross-Realm Password-Based Server Aided Key Exchange
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product / Jeroen van de Graaf ; Davidson Marques
Author Index
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
ACM Workshop on Digital Rights Management, Reihanah Safavi-Naini, Moti Yung, Association for Computing Machinery-Digital Library., Association for Computing Machinery.
Controllable Ring Signatures / Wei Gao ; Guilin Wang ; Xueli Wang ; Dongqing Xie
Efficient User Authentication and Key Agreement in Wireless Sensor Networks / Wen-Shenq Juang
Identity-Based Key Issuing Without Secure Channel in a Broad Area / Saeran Kwon ; Sang-Ho Lee
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution / Ki Hun Lee ; Yuna Kim ; Sung Je Hong ; Jong Kim
Cyber Indication/Intrusion Detection
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks / Jianqing Ma ; Shiyong Zhang ; Yiping Zhong ; Xiaowen Tong
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment / Jae-Chul Park ; Bong-Nam Noh
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm / Seung-Hyun Paek ; Yoon-Keun Oh ; Do-Hoon Lee
Biometrics/Security Trust Management
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords / Daesung Moon ; Sungju Lee ; Seunghwan Jung ; Yongwha Chung ; Okyeon Yi ; Namil Lee ; Kiyoung Moon
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification / Byungkwan Park ; Jin-Won Park
Quality Assurance for Evidence Collection in Network Forensics / Bo-Chao Cheng ; Huan Chen
Secure Software/Systems
Visualization of Permission Checks in Java Using Static Analysis / Yoonkyung Kim ; Byeong-Mo Chang
Deployment of Virtual Machines in Lock-Keeper / Feng Cheng ; Christoph Meinel
Smart Cards/Secure Hardware
Investigations of Power Analysis Attacks and Countermeasures for ARIA / HyungSo Yoo ; Christoph Herbst ; Stefan Mangard ; Elisabeth Oswald ; SangJae Moon
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols / Mun-Kyu Lee ; Jung Ki Min ; Seok Hun Kang ; Sang-Hwa Chung ; Howon Kim ; Dong Kyue Kim
A Novel Key Agreement Scheme in a Multiple Server Environment / Chin-Chen Chang ; Chia-Chi Wu
Mobile Security
Cost-Effective IDS Operating Scheme in MANETs / Youngok Jeong ; Younggoo Han ; Hyunwoo Kim ; Woochul Shim ; Jaehong Kim ; Sehun Kim
Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 / Hyun-Sun Kang ; Chang-Seop Park
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones / Michiru Tanaka ; Yoshimi Teshigawara
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs / Francois Arnault ; Thierry P. Berger ; Cedric Lauradoux ; Marine Minier
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System / Rana Barua ; Sumit Kumar Pandey ; Ravi Pankaj
Extended Multi-Property-Preserving and ECM-Construction / Lei Duo ; Chao Li
Design of a Differential Power Analysis Resistant Masked AES S-Box / Kundan Kumar ; Debdeep Mukhopadhyay ; Dipanwita Roy Chowdhury
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks / Sanjay Burman ; Kamakoti Veezhinathan
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions / Praveen Gauravaram ; Katsuyuki Okeya
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function / Frederic Didier
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware / Cuauhtemoc Mancillas-Lopez ; Debrup Chakraborty ; Francisco Rodriguez-Henriquez
Author Index
Hashing / I:
Linearization Attacks Against Syndrome Based Hashes / Markku-Juhani O. Saarinen
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Languages, and Programming International Colloquium on Automata, Lu?s Caires, Takeo Kanade, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi, Moti Yung
出版情報:
Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Using Feedback to Improve Masquerade Detection / Kwong H. Yung
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services / Zhi Guo ; Kwok-Yan Lam ; Siu-Leung Chung ; Ming Gu ; Jia-Guang Sun
An IP Traceback Scheme Integrating DPM and PPM / Fan Min ; Jun-yan Zhang ; Guo-wie Yang
Cryptographic Algorithms
Improved Scalable Hash Chain Traversal / Sung-Ryul Kim
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem / Rui Zhang ; Hideki Imai
On the Security of Two Threshold Signature Schemes with Traceable Signers / Guilin Wang ; Xiaoxi Han ; Bo Zhu
Digital Signature
Proxy and Threshold One-Time Signatures / Mohamed Al-Ibrahim ; Anton Cerny
A Threshold GQ Signature Scheme / Li-Shan Liu ; Cheng-Kang Chu ; Wen-Guey Tzeng
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary / Gene Itkis ; Peng Xie
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme / Chong-zhi Gao ; Zheng-an Yao ; Lei Li
Security Modelling
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems / Ching Lin ; Vijay Varadharajan
An Authorization Model for E-consent Requirement in a Health Care Application / Chun Ruan
PLI: A New Framework to Protect Digital Content for P2P Networks / Guofei Gu ; Bin B. Zhu ; Shipeng Li ; Shiyong Zhang
Common Vulnerability Markup Language / Haitao Tian ; Liusheng Huang ; Zhi Zhou ; Hui Zhang
Trust on Web Browser: Attack vs. Defense / Tie-Yan Li ; Yongdong Wu
Security Protocols
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards / Luciano Rila ; Chris J. Mitchell
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party / Jae-Gwi Choi ; Kouichi Sakurai ; Ji-Hwan Park
Differential Fault Analysis on A.E.S / Pierre Dusart ; Gilles Letourneux ; Olivier Vivolo
Side-Channel Attack on Substitution Blocks / Roman Novak
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation / Yasuyuki Sakai
A Fast Correlation Attack for LFSR-Based Stream Ciphers / Sarbani Palit ; Bimal K. Roy ; Arindom De
Key Management
Making the Key Agreement Protocol in Mobile Ad Hoc Network
More Efficient / Gang Yao ; Kui Ren ; Feng Bao ; Robert H. Deng ; Dengguo Feng
An Efficient Tree-Based Group Key Agreement Using Bilinear Map / Sangwon Lee ; Yongdae Kim ; Kwangjo Kim ; Dae-Hyun Ryu
A Key Recovery Mechanism for Reliable Group Key Management / Taenam Cho ; Sang-Ho Lee
Efficient Implementations
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model / Sandeepan Chowdhury ; Subhamoy Maitra
Efficient Distributed Signcryption Scheme as Group Signcryption / DongJin Kwak ; SangJae Moon
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors / Johann Großschädl ; Guy-Armand Kamendje
Author Index
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Languages, and Programming International Colloquium on Automata, Luís Caires, Takeo Kanade, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi, Moti Yung
出版情報:
SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
Restricted Identification Scheme and Diffie-Hellman Linking Problem / Miroslaw Kutylowski ; Lukasz Krzywiecki ; Przemyslaw Kubiak ; Michal Koza
Trusted Networks
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks / Dong Hao ; Avishek Adhikari ; Kouichi Sakurai
Hash Chains at the Basis of a Secure Reactive Routing Protocol / Thouraya Bouabana-Tebibel
Implementation
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM / Patrick Koeberl ; Jiangtao Li ; Roel Maes ; Anand Rajan ; Claire Vishik ; Marcin Wójcik
A Performance Analysis of Identity-Based Encryption Schemes / Pengqi Cheng ; Yan Gu ; Zihong Lu ; Jianfei Wang ; Wenlei Zhu ; Zhen Chen ; Jiwei Huang
Direct Anonymous Attestation
A (Corrected) DAA Scheme Using Batch Proof and Verification / Ernie Brickell
Brief Announcement: Fast Convergence in Route-Preservation / Jorge A. Cobb
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure / S. Dov Gordon ; Jonathan Katz ; Ranjit Kumaresan ; Arkady Yerukhimovich
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks / Tuan Manh Vu ; Reihaneh Safavi-Naini ; Carey Williamson
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses / Mahesh Arumugam ; Murat Demirbas ; Sandeep S. Kulkarni
Modeling and Analyzing Periodic Distributed Computations / Anurag Agarwal ; Vijay K. Garg ; Vinit Ogale
Complexity Issues in Automated Model Revision without Explicit Legitimate State / Fuad Abujarad
Algorithmic Verification of Population Protocols / Ioannis Chatzigiannakis ; Othon Michail ; Paul G. Spirakis
Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks / Bo Zhang ; Robert Simon ; Hakan Aydin
Stably Decidable Graph Languages by Mediated Population Protocols
Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping / Evangelos Kranakis ; Michel Paquette
Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage / Matthew P. Johnson ; Amotz Bar-Noy ; Mani Srivastava
Brief Announcement: On the Hardness of Topology Inference / H.B. Acharya ; Mohamed Gouda
A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing Era / Ji Lu ; Yaoxue Zhang ; Yuezhi Zhou
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks / Pierre Leone ; Marina Papatriantafilou ; Elad M. Schiller ; Gongxi Zhu
A Comparative Study of Rateless Codes for P2P Persistent Storage / Heverson B. Ribeiro ; Emmanuelle Anceaume
Dynamically Reconfigurable Filtering Architectures / Mathieu Valero ; Luciana Arantes ; Pierre Sens
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems / Yaser Houri ; Bernhard Amann ; Thomas Fuhrmann
A Framework for Secure and Private P2P Publish/Subscribe / Samuel Bernard
Snap-Stabilizing Linear Message Forwarding / Alain Cournier ; Anissa Lamani ; Franck Petit ; Vincent Villain
Vulnerability Analysis of High Dimensional Complex Systems / Vedant Misra ; Dion Harmon ; Yaneer Bar-Yam
Storage Capacity of Labeled Graphs / Dana Angluin ; James Aspnes ; Rida A. Bazzi ; Jiang Chen ; David Eisenstat ; Goran Konjevod
Safe Flocking in Spite of Actuator Faults / Taylor Johnson ; Sayan Mitra
Author Index
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs / Francois Arnault ; Thierry P. Berger ; Cedric Lauradoux ; Marine Minier
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System / Rana Barua ; Sumit Kumar Pandey ; Ravi Pankaj
Extended Multi-Property-Preserving and ECM-Construction / Lei Duo ; Chao Li
Design of a Differential Power Analysis Resistant Masked AES S-Box / Kundan Kumar ; Debdeep Mukhopadhyay ; Dipanwita Roy Chowdhury
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks / Sanjay Burman ; Kamakoti Veezhinathan
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions / Praveen Gauravaram ; Katsuyuki Okeya
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function / Frederic Didier
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware / Cuauhtemoc Mancillas-Lopez ; Debrup Chakraborty ; Francisco Rodriguez-Henriquez
Author Index
Hashing / I:
Linearization Attacks Against Syndrome Based Hashes / Markku-Juhani O. Saarinen
A Meet-in-the-Middle Collision Attack Against the New FORK-256