close
1.

図書

図書
Ira S. Moskowitz (ed.)
出版情報: Berlin : Springer, c2001  viii, 412 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2137
所蔵情報: loading…
目次情報: 続きを見る
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
Information Hiding through Noisy Channels / Valeri Korjik ; Guillermo Morales-Luna
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding / M. Kivanç Mihçak ; Ramarathnam Venkatesan
Computational Forensic Techniques for Intellectual Property Protection / Jennifer L. Wong ; Darko Kirovski ; Miodrag Potkonjak
Intellectual Property Metering / Farinaz Koushanfar ; Gang Qu
Keyless Public Watermarking for Intellectual Property Authentication
Efficiency Improvements of the Private Message Service / Oliver Berthold ; Sebastian Clauß ; Stefan Köpsell ; Andreas Pfitzmann
A Reputation System to Increase MIX-Net Reliability / Roger Dingledine ; Michael J. Freedman ; David Hopwood ; David Molnar
Neural Networks Functions for Public Key Watermarking / Justin Picard ; Arnaud Robert
A Graph Theoretic Approach to Software Watermarking / Vijay Vazirani ; Saurabh Sinha
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks / Dimitris Thanos
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation / Mikhail J. Atallah ; Victor Raskin ; Michael Crogan ; Christian Hempelmann ; Florian Kerschbaum ; Dina Mohamed ; Sanket Naik
Digital Watermarking of Chemical Structure Sets / Joachim J. Eggers ; Wolf-Dietrich Ihlenfeldt ; Bernd Girod
The Strong Eternity Service / Tonda BeneÜ
Real World Patterns of Failure in Anonymity Systems / Richard Clayton ; George Danezis ; Markus G. Kuhn
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems / Adam Back ; Ulf Möller ; Anton Stiglic
Automatic Detection of a Watermarked Document Using a Private Key / Julien P. Stern ; Jean-Pierre Tillich
Zero-Knowledge Watermark Detection and Proof of Ownership / André Adelsbach ; Ahmad-Reza Sadeghi
F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis / Andreas Westfeld
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience / Hirofumi Muratani
Practical Capacity of Digital Watermarks / Ryo Sugihara
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Thierry Pun
Second Generation Benchmarking and Application Oriented Evaluation / Shelby Pereira ; Maribel Madueno ; Stéphan Marchand-Maillet
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum / Henrique Malvar
Hiding Association Rules by Using Confidence and Support / Elena Dasseni ; Vassilios S. Verykios ; Ahmed K. Elmagarmid ; Elisa Bertino
How to Break a Semi-anonymous Fingerprinting Scheme
An Analysis of One of the SDMI Candidates / Julien Boeuf
Author Index
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
2.

図書

図書
Colin Boyd (ed.)
出版情報: Berlin ; New York : Springer, c2001  xi, 601 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2248
所蔵情報: loading…
目次情報: 続きを見る
Lattice Based Cryptography
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski
The Modular Inversion Hidden Number Problem / Dan Boneh ; Shai Halevi ; Nick Howgrave-Graham
Human Identification
Secure Human Identification Protocols / Nicholas J. Hopper ; Manuel Blum
Invited Talk
Unbelievable Security (Matching AES Security Using Public Key Systems) / Arjen K. Lenstra
Practical Public Key Cryptography
A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4 / Siguna Müller
Computation of Discrete Logarithms in {op F}_{{2}^{607}}cEmmanuel Thomé
Speeding Up XTR / Martijn Stam
An Efficient Implementation of Braid Groups / Jae Choon Cha ; Ki Hyoung Ko ; Sang Jin Lee ; Jae Woo Han ; Jung Hee Cheon
Cryptography Based on Coding Theory
How to Achieve a McEliece-Based Digital Signature Scheme / Nicolas T. Courtois ; Matthieu Finiasz ; Nicolas Sendrier
Efficient Traitor Tracing Algorithms Using List Decoding / Alice Silverberg ; Jessica Staddon ; Judy L. Walker
Block Ciphers
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis / Makoto Sugita ; Kazukuni Kobara ; Hideki Imai
Known-IV Attacks on Triple Modes of Operation of Block Ciphers / Deukjo Hong ; Jaechul Sung ; Seokhie Hong ; Wonil Lee ; Sangjin Lee ; Jongin Lim ; Okyeon Yi
Generic Attacks on Feistel Schemes / Jacques Patarin
A Compact Rijndael Hardware Architecture with S-Box Optimization / Akashi Satoh ; Sumio Morioka ; Kohji Takano ; Seiji Munetoh
Provable Security
Provable Security of KASUMI and 3GPP Encryption Mode f8 / Ju-Sung Kang ; Sang-Uk Shin ; Dowon Hong
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices / Duncan S. Wong ; Agnes H. Chan
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case / Emmanuel Bresson ; Olivier Chevassut ; David Pointcheval
Threshold Cryptography
Fully Distributed Threshold RSA under Standard Assumptions / Pierre-Alain Fouque
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes / Anna Lysyanskaya ; Chris Peikert
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Two-Party Protocols
Oblivious Polynomial Evaluation and Oblivious Neural Learning / Yan-Cheng Chang ; Chi-Jen Lu
Mutually Independent Commitments / Moses Liskov ; Silvio Micali ; Leonid Reyzin ; Adam Smith
Zero Knowledge
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
Responsive Round Complexity and Concurrent Zero-Knowledge / Tzafrir Cohen ; Joe Kilian ; Erez Petrank
Cryptographic Building Blocks
Practical Construction and Analysis of Pseudo-Randomness Primitives / Johan Hastad ; Mats Näslund
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions / Yuriy Tarannikov ; Peter Korolev ; Anton Botev
Elliptic Curve Cryptography
An Extension of KedlayaÆs Point-Counting Algorithm to Superelliptic Curves / Pierrick Gaudry ; Nicolas Gürel
Supersingular Curves in Cryptography / Steven D. Galbraith
Short Signatures from the Weil Pairing / Ben Lynn ; Hovav Shacham
Self-Blindable Credential Certificates from the Weil Pairing / Eric R. Verheul
Anonymity
How to Leak a Secret / Ronald L. Rivest ; Adi Shamir ; Yael Tauman
Key-Privacy in Public-Key Encryption / Mihir Bellare ; Alexandra Boldyreva ; Anand Desai
Provably Secure Fair Blind Signatures with Tight Revocation / Masayuki Abe ; Miyako Ohkubo
tAuthor Index
Lattice Based Cryptography
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski
3.

図書

図書
C. Pandu Rangan, Cunsheng Ding (eds.)
出版情報: Berlin : Springer, c2001  xiii, 349 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2247
所蔵情報: loading…
目次情報: 続きを見る
Invited Lecture Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut
Hashing
Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer
A New Anonymous Fingerprinting Scheme with High Enciphering Rate / M. Kuribayashi ; H. Tanaka
A Parallel Algorithm for Extending Cryptographic Hash Functions / P. Sarkar ; P.J. Schellenberg
Incremental Hash Function Based on Pair Chaining& Modular Arithmetic Combining / B.-M. Goi ; M.U. Siddiqi ; H.-T. Chuah
Algebraic Schemes
Multiples of Primitive Polynomials over GF(2) / K.C. Gupta ; S. Maitra
Fast Generation of Cubic Irreducible Polynomials for XTR / J.M. Kim ; I. Yie ; S.I. Oh ; H.D. Kim ; J. Ryu
CheatingPrevention in Secret Sharingover GF(pt) / J. Pieprzyk ; X.-M. Zhang
Elliptic Curves
An Application of Sieve Methods to Elliptic Curves / S.A. Miri ; V.K. Murty
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography / H. Baier
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography / M. Ciet ; J.-J. Quisquater ; F. Sica
Coding Theory
Frameproof and IPP Codes / D.R. Stinson
Linear Authentication Codes: Bounds and Constructions / R. Safavi-Naini ; H. Wang ; C. Xing
Applications - I
Selective Receipt in Certified E-Mail / S. Kremer ; O. Markowitch
Spatial Domain Digital Watermarking with Buyer Authentication / D.P. Mukherjee
Efficient Public Auction with One-Time Registration and Public Verifiability / B. Lee ; K. Kim ; J. Ma
An Analysis of Integrity Services in Protocols / K. Viswanathan ; C. Boyd ; E. Dawson
Cryptanalysis
Cryptananlysis of the Nonlinear FeedForward Generator / S.S. Bedi ; N.R. Pillai
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree / M. Maurer ; A. Menezes ; E. Teske
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem / A. Youssef ; G. Gong
Distributed Cryptography
Robust and Secure Broadcasting / Y. Mu ; V. Varadharajan
Toward Optimal Player Weights in Secure Distributed Protocols / K. Srinathan ; C.P. Rangan ; V. Kamakoti
Boolean Functions
Autocorrelation Properties of Correlation Immune Boolean Functions
On the Constructingof Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices / M. Fedorova ; Y. Tarannikov
Digital Signatures
A Twin Algorithm for Efficient Generation of Digital Signatures / D. Ramesh
Efficient ôon the Flyö Signature Schemes Based on Integer Factoring / T. Okamoto ; M. Tada ; A. Miyaji
Shift Registers
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator / A. Kholosha
Efficient Software Implementation of Linear Feedback Shift Registers / S. Chowdhury
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 / S. Lim ; S. Kim ; J. Kim
Applications - II
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography / L. Shujun ; M. Xuanqin ; C. Yuanlong
Re-dividingComplexity between Algorithms and Keys (Key Scripts) / G. Samid
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function / E. Kiltz
Author Index
Invited Lecture Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut
Hashing
Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer
4.

図書

図書
Dongho Won (ed.)
出版情報: Berlin : Springer, c2001  x, 260 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2015
所蔵情報: loading…
目次情報: 続きを見る
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures / Ju-Sung Kang ; Seongtaek Chee ; Choonsik Park
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack / Hidema Tanaka ; Chikashi Ishii ; Toshinobu Kaneko
On MISTY1 Higher Order Differential Cryptanalysis / Steve Babbage ; Laurent Frisch
Difference Distribution Attack on DONUT and Improved DONUT / Dong Hyeon Cheon ; Seok Hie Hong ; Sang Jin Lee ; Sung Jae Lee ; Kyung Hwan Park ; Seon Hee Yoon
New Results on Correlation Immunity / Yuliang Zheng ; Xian-Mo Zhang
Elliptic Curves and Resilient Functions / Jung Hee Cheon
Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction / Ted Krovetz ; Phillip Rogaway
Characterization of Elliptic Curve Traces under FR-Reduction / Atsuko Miyaji ; Masaki Nakabayashi ; Shunzo Takano
A Multi-party Optimistic Non-repudiation Protocol / Olivier Markowitch ; Steve Kremer
Secure Matchmaking Protocol / Byoungcheon Lee ; Kwangjo Kim
An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA / Takeru Miyazaki
Efficient and Secure Member Deletion in Group Signature Schemes / Hyun-Jeong Kim ; Jong In Lim ; Dong Hoon Lee
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods / Feng Bao ; Robert H. Deng ; Peirong Feng
An Internet Anonymous Auction Scheme / Yi Mu ; Vijay Varadharajan
Efficient Sealed-Bid Auction Using Hash Chain / Koutarou Suzuki ; Kunio Kobayashi ; Hikaru Morita
Micropayments for Wireless Communications / DongGook Park ; Colin Boyd ; Ed Dawson
Cryptographic Applications of Sparse Polynomials over Finite Rings / William D. Banks ; Daniel Lieman ; Igor E. Shparlinski ; Van Thuong To
Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors / Chanjoo Chung ; Seungbok Choi ; Dongho Won ; Youngchul Choi
Hash to the Rescue: Space Minimization for PKI Directories / Adam Young ; Moti Yung
A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management / Jae Seung Lee ; Sang Choon Kim ; Seung Won Sohn
Author Index
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures / Ju-Sung Kang ; Seongtaek Chee ; Choonsik Park
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack / Hidema Tanaka ; Chikashi Ishii ; Toshinobu Kaneko
On MISTY1 Higher Order Differential Cryptanalysis / Steve Babbage ; Laurent Frisch
5.

図書

図書
Douglas R. Stinson, Stafford Tavares (eds.)
出版情報: Berlin : Springer, c2001  ix, 338 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2012
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis I
Analysis of IS-95 CDMA Voice Privacy / Muxiang Zhang ; Christopher Carroll ; Agnes Chan
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security / David A. McGrew ; Scott R. Fluhrer
Cryptanalysis of the ôAugmented Family of Cryptographic Parity Circuitsö Proposed at ISW'97 / A.M. Youssef
Block Ciphers - New Designs
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis / Kazumaro Aoki ; Tetsuya Ichikawa ; Masayuki Kanda ; Mitsuru Matsui ; Shiho Moriai ; Junko Nakajima ; Toshio Tokita
DFCv2 / Louis Granboulan ; Phong Q. Nguyen ; Fabrice Noilhan ; Serge Vaudenay
The Block Cipher Hierocrypt / Kenji Ohkuma ; Hirofumi Muratani ; Fumihiko Sano ; Shinichi Kawamura
Symmetric Block Ciphers Based on Group Bases / Valer Canda ; Tran van Trung ; Spyros Magliveras ; Tamas Horvath
Elliptic Curves and Efficient Implementations
Speeding up the Arithmetic on Koblitz Curves of Genus Two / Christian Gunther ; Tanja Lange ; Andreas Stein
On Complexity of Polynomial Basis Squaring in F2m / Huapeng Wu
Security Protocols and Applications
Dynamic Multi-threshold Metering Schemes / Carlo Blundo ; Annalisa De Bonis ; Barbara Masucci ; Douglas R. Stinson
Chained Stream Authentication / Francesco Bergadano ; Davide Cavagnino ; Bruno Crispo
A Global PMI for Electronic Content Distribution / Carlisle Adams ; Robert Zuccherato
Block Ciphers and Hash Functions
A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers / John O. Pliam
Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
HAS-V: A New Hash Function with Variable Output Length / Nan Kyoung Park ; Joon Ho Hwang ; Pil Joong Lee
Boolean Functions and Stream Ciphers
On Welch-Gong Transformation Sequence Generators / G. Gong
Modes of Operation of Stream Ciphers / Jovan Dj. Golic
LILI Keystream Generator / Leonie Ruth Simpson ; E. Dawson ; WilliamL. Millan
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions / Yuliang Zheng ; Xian-Mo Zhang
Public Key Systems
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders / Detlef Huhnlein ; Michael J. Jacobson, Jr. ; Damian Weber
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields / Sachar Paulus
Cryptanalysis II
Root Finding Interpolation Attack / Kaoru Kurosawa ; Tetsu Iwata ; Viet Duong Quang
Differential Cryptanalysis of Reduced Rounds of GOST / Haruki Seki ; Toshinobu Kaneko
Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function
Author Index
Cryptanalysis I
Analysis of IS-95 CDMA Voice Privacy / Muxiang Zhang ; Christopher Carroll ; Agnes Chan
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security / David A. McGrew ; Scott R. Fluhrer
6.

図書

図書
David Naccache (ed.)
出版情報: Berlin : Springer, c2001  xii, 471 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2020
所蔵情報: loading…
7.

図書

図書
Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.)
出版情報: Berlin : Springer, c2001  xiii, 311 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2052
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
An Intelligent Decision Support System for Intrusion Detection and Response / Dipankar Dasgupta ; Fabio A. Gonzalez
Mathematical Models of the Covert Channels / Alexander Grusho
Open Issues in Formal Methods for Cryptographic Protocol Analysis / Catherine Meadows
Future Directions in Role-Based Access Control Models / Ravi Sandhu
Secure Networked Computing / Vijay Varadharajan
Network Security Systems: Foundations, Models, and Architectures Composability of Secrecy / Jan Jurjens
Agent-Based Model of Computer Network Security System: A Case Study / Vladimir I. Gorodetski ; O. Karsayev ; A. Khabalov ; I. Kotenko ; Leonard J. Popyack ; Victor A. Skormin
Security Considerations and Models for Service Creation in Premium IP Networks / Michael Smirnov
Secure Systems Design Technology / Peter D. Zegzhda ; Dmitry P. Zegzhda
A Privacy-Enhancing e-Business Model Based on Infomediaries / Dimitris Gritzalis ; Konstantinos Moulinos ; Konstantinos Kostis
Applying Practical Formal Methods to the Specification and Analysis of Security Properties / Constance Heitmeyer
Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ) / Andrey Kostogryzov
Analyzing Separation of Duties in Petri Net Workflows / Konstantin Knorr ; Harald Weidner
Intrusion Detection: Foundations and Models
Information Security with Formal Immune Networks / Alexander O. Tarakanov
BASIS: A Biological Approach to System Information Security / Jose G. Delgado-Frias ; Dennis L. McGee ; Joseph V. Giordano
Learning Temporal Regularities of User Behavior for Anomaly Detection / Alexandr Seleznyov ; Oleksiy Mazhelis ; Seppo Puuronen
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining / Harjit Singh ; Steven Furnell ; Benn Lines ; Paul Dowland
Access Control, Authentication, and Authorization
Typed MSR: Syntax and Examples / Iliano Cervesato
The Set and Function Approach to Modeling Authorization in Distributed Systems / Steve Barker ; Tatyana Ryutov ; Clifford Neuman
Fenix Secure Operating System: Principles, Models, and Architecture / Pavel G. Stepanov ; Alexey D. Otavin
Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods
Generalized Oblivious Transfer Protocols Based on Noisy Channels / Valeri Korjik ; Kirill Morozov
Controlled Operations as a Cryptographic Primitive / Boris V. Izotov ; Alexander A. Moldovyan ; Nick A. Moldovyan
Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes / Viktor Yakovlev ; Valery Korjik ; Alexander Sinuk
Dynamic Group Key Management Protocol / Ghassan Chaddoud ; Isabelle Chrisment ; Andre Schaff
SVD-Based Approach to Transparent Embedding Data into Digital Images / Vladimir Samoilov
Fast Encryption Algorithm Spectr-H64 / Nick D. Goots
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols / Antonio Durante ; Riccardo Focardi ; Roberto Gorrieri
On Some Cryptographic Properties of Rijndael / Selcuk Kavut ; Melek D. Yucel
Author Index
Invited Talks
An Intelligent Decision Support System for Intrusion Detection and Response / Dipankar Dasgupta ; Fabio A. Gonzalez
Mathematical Models of the Covert Channels / Alexander Grusho
8.

図書

図書
Vijay Varadharajan, Yi Mu (eds.)
出版情報: Berlin : Springer, c2001  xi, 522 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2119
所蔵情報: loading…
9.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2001  viii, 307 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Non-interference and Information Flow
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar
Robust Declassification / S. Zdancewic ; A. Myers
Access Control
A State-Transition Model of Trust Management and Access Control / A. Chander ; D. Dean ; J. Mitchell
Revocations--A Classification / A. Hagstrom ; S. Jajodia ; F. Parisi-Presicce ; D. Wijesekera
A Logical Reconstruction of SPKI / J. Halpern ; R. van der Meyden
Protocols I
A Security Analysis of the Cliques Protocols Suites / O. Pereira ; J.-J. Quisquater
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules / B. Blanchet
Proving Secrecy is Easy Enough / V. Cortier ; J. Millen ; H. Ruess
Panel
Relating Cryptography and Cryptographic Protocols / A. Scedrov (Moderator) ; R. Canetti ; J. Guttman ; D. Wagner ; M. Waidner
Information Flow and Multi-threading
A New Type System for Secure Information Flow / G. Smith
A Generic Approach to the Security of Multi-threaded Programs / H. Mantel ; A. Sabelfeld
Protocols II
Authenticity by Typing for Security Protocols / A. Gordon ; A. Jeffrey
Computing Symbolic Models for Verifying Cryptographic Protocols / M. Fiore ; M. Abadi
Protocol Insecurity with Finite Number of Sessions is NP-Complete / M. Rusinowitch ; M. Turuani
Intrusion Tolerance and Detection
Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance / P. Liu
Markov Chains, Classifiers, and Intrusion Detection / S. Jha ; K. Tan ; R. Maxion
Log Auditing through Model-Checking / M. Roger ; J. Goubault-Larrecq
Non-interference: Who Needs It? / P. Ryan (Moderator) ; J. McLean ; V. Gligor
Logics for Protocol Verification
A Compositional Logic for Protocol Correctness / N. Durgin ; D. Pavlovic
Logical Relations for Encryption / E. Sumii ; B. Pierce
Secrecy and Privacy
Privacy-Preserving Cooperative Scientific Computations / W. Du ; M. Atallah
Confined Mobile Functions / Z. Kirli
Confidentiality-Preserving Refinement / M. Heisel ; A. Pfitzmann ; T. Santen
Author Index
Preface
Workshop Committee
Non-interference and Information Flow
10.

図書

図書
Joe Kilian (ed.)
出版情報: Berlin ; Tokyo : Springer, c2001  xi, 598 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2139
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼