A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model / Zhengyi Le ; Yi Ouyang ; James Ford ; Fillia Makedon
Certificate Recommendations to Improve the Robustness of Web of Trust / Qinglin Jiang
Mobile and Ad Hoc Security
Universally Composable Secure Mobile Agent Computation / Ke Xu ; Stephen R. Tate
Re-thinking Security in IP Based Micro-Mobility / Jukka Ylitalo ; Jan Melén ; Pekka Nikander ; Vesa Torvinen
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group / Qianhong Wu ; Changjie Wang ; Yumin Wang
Web Security
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions / HongQian Karen Lu ; Asad Ali
Provable Unlinkability Against Traffic Analysis Already After <$>{\cal O}<$>(log(n)) Steps! / Marcin Gomułkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
An Efficient Online Electronic Cash with Unlinkable Exact Payments / Toru Nakanishi ; Mitsuaki Shiota ; Yuji Sugiyama
Digital Rights Management
Modifiable Digital Content Protection in P2P / Heejae Park ; Jong Kim
Survey on the Technological Aspects of Digital Rights Management / William Ku ; Chi-Hung Chi
Detecting Software Theft via Whole Program Path Birthmarks / Ginger Myles ; Christian Collberg
Software Security
Effective Security Requirements Analysis: HAZOP and Use Cases / Thitima Srivatanakul ; John A. Clark ; Fiona Polack
The Obfuscation Executive / Kelly Heffner
Author Index
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
Information Hiding through Noisy Channels / Valeri Korjik ; Guillermo Morales-Luna
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding / M. Kivanç Mihçak ; Ramarathnam Venkatesan
Computational Forensic Techniques for Intellectual Property Protection / Jennifer L. Wong ; Darko Kirovski ; Miodrag Potkonjak
Intellectual Property Metering / Farinaz Koushanfar ; Gang Qu
Keyless Public Watermarking for Intellectual Property Authentication
Efficiency Improvements of the Private Message Service / Oliver Berthold ; Sebastian Clauß ; Stefan Köpsell ; Andreas Pfitzmann
A Reputation System to Increase MIX-Net Reliability / Roger Dingledine ; Michael J. Freedman ; David Hopwood ; David Molnar
Neural Networks Functions for Public Key Watermarking / Justin Picard ; Arnaud Robert
A Graph Theoretic Approach to Software Watermarking / Vijay Vazirani ; Saurabh Sinha
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks / Dimitris Thanos
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation / Mikhail J. Atallah ; Victor Raskin ; Michael Crogan ; Christian Hempelmann ; Florian Kerschbaum ; Dina Mohamed ; Sanket Naik
Digital Watermarking of Chemical Structure Sets / Joachim J. Eggers ; Wolf-Dietrich Ihlenfeldt ; Bernd Girod
The Strong Eternity Service / Tonda BeneÜ
Real World Patterns of Failure in Anonymity Systems / Richard Clayton ; George Danezis ; Markus G. Kuhn
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems / Adam Back ; Ulf Möller ; Anton Stiglic
Automatic Detection of a Watermarked Document Using a Private Key / Julien P. Stern ; Jean-Pierre Tillich
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski
The Modular Inversion Hidden Number Problem / Dan Boneh ; Shai Halevi ; Nick Howgrave-Graham
Human Identification
Secure Human Identification Protocols / Nicholas J. Hopper ; Manuel Blum
Invited Talk
Unbelievable Security (Matching AES Security Using Public Key Systems) / Arjen K. Lenstra
Practical Public Key Cryptography
A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4 / Siguna Müller
Computation of Discrete Logarithms in {op F}_{{2}^{607}}cEmmanuel Thomé
Speeding Up XTR / Martijn Stam
An Efficient Implementation of Braid Groups / Jae Choon Cha ; Ki Hyoung Ko ; Sang Jin Lee ; Jae Woo Han ; Jung Hee Cheon
Cryptography Based on Coding Theory
How to Achieve a McEliece-Based Digital Signature Scheme / Nicolas T. Courtois ; Matthieu Finiasz ; Nicolas Sendrier
Efficient Traitor Tracing Algorithms Using List Decoding / Alice Silverberg ; Jessica Staddon ; Judy L. Walker
Block Ciphers
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis / Makoto Sugita ; Kazukuni Kobara ; Hideki Imai
Known-IV Attacks on Triple Modes of Operation of Block Ciphers / Deukjo Hong ; Jaechul Sung ; Seokhie Hong ; Wonil Lee ; Sangjin Lee ; Jongin Lim ; Okyeon Yi
Generic Attacks on Feistel Schemes / Jacques Patarin
A Compact Rijndael Hardware Architecture with S-Box Optimization / Akashi Satoh ; Sumio Morioka ; Kohji Takano ; Seiji Munetoh
Provable Security
Provable Security of KASUMI and 3GPP Encryption Mode f8 / Ju-Sung Kang ; Sang-Uk Shin ; Dowon Hong
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices / Duncan S. Wong ; Agnes H. Chan
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case / Emmanuel Bresson ; Olivier Chevassut ; David Pointcheval
Threshold Cryptography
Fully Distributed Threshold RSA under Standard Assumptions / Pierre-Alain Fouque
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes / Anna Lysyanskaya ; Chris Peikert
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Two-Party Protocols
Oblivious Polynomial Evaluation and Oblivious Neural Learning / Yan-Cheng Chang ; Chi-Jen Lu
Mutually Independent Commitments / Moses Liskov ; Silvio Micali ; Leonid Reyzin ; Adam Smith
Zero Knowledge
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
Responsive Round Complexity and Concurrent Zero-Knowledge / Tzafrir Cohen ; Joe Kilian ; Erez Petrank
Cryptographic Building Blocks
Practical Construction and Analysis of Pseudo-Randomness Primitives / Johan Hastad ; Mats Näslund
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions / Yuriy Tarannikov ; Peter Korolev ; Anton Botev
Elliptic Curve Cryptography
An Extension of KedlayaÆs Point-Counting Algorithm to Superelliptic Curves / Pierrick Gaudry ; Nicolas Gürel
Supersingular Curves in Cryptography / Steven D. Galbraith
Short Signatures from the Weil Pairing / Ben Lynn ; Hovav Shacham
Self-Blindable Credential Certificates from the Weil Pairing / Eric R. Verheul
Anonymity
How to Leak a Secret / Ronald L. Rivest ; Adi Shamir ; Yael Tauman
Key-Privacy in Public-Key Encryption / Mihir Bellare ; Alexandra Boldyreva ; Anand Desai
Real-Time Intruder Tracing through Self-Replication / Heejin Jang ; Sangwook Kim
On the Difficulty of Protecting Private Keys in Software / Taekyoung Kwon
Intrusion Detection with Support Vector Machines and Generative Models / John S. Baras ; Maben Rabi
Cryptographic Algorithm and Attack Implementation
Small and High-Speed Hardware Architectures for the 3GPP StandardCipher KASUMI / Akashi Satoh ; Sumio Morioka
Fast Software Implementations of SC2000 / Helger Lipmaa
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 / Tim Grembowski ; Roar Lien ; Kris Gaj ; Nghi Nguyen ; Peter Bellows ; Jaroslav Flidr ; Tom Lehman ; Brian Schott
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG / Kahil Jallad ; Jonathan Katz ; Bruce Schneier
Access Control and Trust Management (I)
Role-Based Access Control for E-commerce Sea-of-Data Applications / G. Navarro ; S. Robles ; J. Borrell
An Access Control Model for Tree Data Structures / Alban Gabillon ; Manuel Munier ; Jean-Jacques Bascou ; Laurent Gallon ; Emmanuel Bruno
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI / Ed Dawson ; Javier Lopez ; Jose A. Montenegro ; Eiji Okamoto
Authentication and Privacy
Password Authenticated Key Exchange Based on RSA for ImbalancedWireless Networks / Feng Zhu ; Duncan S. Wong ; Agnes H. Chan ; Robbie Ye
Quantifying Privacy Leakage through Answering Database Queries / Tsan-sheng Hsu ; Churn-Jung Liau ; Da-Wei Wang ; Jeremy K.-P. Chen
A New Offline Privacy Protecting E-cash System with Revokable Anonymity / Weidong Qiu ; Kefei Chen ; Dawu Gu
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion)
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / William Aiello ; Steven M. Bellovin ; Matt Blaze ; Ran Canetti ; John Ioannidis ; Angelos D. Keromytis ; Omer Reingold
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion)
Thwarting Timing Attacks Using ATM Networks / Geraint Price
Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion)
Towards a Survivable Security Architecture for Ad-Hoc Networks / Tuomas Aura ; Silja Mäki
Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion)
PIM Security / Dieter Gollmann
PIM Security (Transcript of Discussion)
Merkle Puzzles Revisited - Finding Matching Elements between Lists / Bruce Christianson ; David Wheeler
Merkle Puzzles Revisited (Transcript of Discussion)
Encapsulating Rules of Prudent Security Engineering (Position Paper) / Jan Jürjens
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion)
A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura ; Kunihiko Miyazaki ; Shinji Itoh ; Kazuo Takaragi ; Ryoichi Sasaki
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion)
A Proof of Non-repudiation / Giampaolo Bella ; Lawrence C. Paulson
A Proof of Non-repudiation (Transcript of Discussion) / Larry Paulson
Using Authority Certificates to Create Management Structures / Babak Sadighi Firozabadi ; Marek Sergot ; Olav Bandmann
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion)
Trust Management and Whether to Delegate / Simon N. Foley
Trust Management and Whether to Delegate (Transcript of Discussion)
You Can't Take It with You (Transcript of Discussion) / Mark Lomas
Protocols Using Keys from Faulty Data
Protocols Using Keys from Faulty Data (Transcript of Discussion)
On the Negotiation of Access Control Policies / Virgil D. Gligor ; Himanshu Khurana ; Radostina K. Koleva ; Vijay G. Bharadwaj ; John S. Baras
Negotiation of Access Control Policies (Transcript of Discussion)
Intrusion-Tolerant Group Management in Enclaves (Transcript of Discussion) / Hassen Sa¿idi
Lightweight Authentication in a Mobile Network (Transcript of Discussion) / James Malcolm
Bluetooth Security - Fact or Fiction? (Transcript of Discussion) / Peter Drabwell
Concluding Discussion When Does Confidentiality Harm Security? / Chair: Bruce Christianson
The Last Word / Thucydides
Author Index
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
Ensembles of Learning Machines / Giorgio Valentini ; Francesco Masulli
Eduardo R. Caianiello Lecture
Learning Preference Relations from Data / Theodoros Evgniou ; Massimiliano Pontil
Francesco E. Lauria Lecture
Increasing the Biological Inspiration of Neural Networks / Francesco E. Lauria
Architectures and Algorithms
Hybrid Automatic Trading Systems: Technical Analysis & Group Method of Data Handling / Marco Corazza ; Paolo Vanni ; Umberto Loschi
Interval TOPSIS for Multicriteria Decision Making / Silvio Giove
A Distributed Algorithm for Max Independent Set Problem Based on Hopfield Networks / Giuliano Grossi ; Roberto Posenato
Extended Random Neural Networks / G. Martinelli ; F. M. Frattale Mascioli ; M. Panella ; A. Rizzi
Generalized Independent Component Analysis as Density Estimation / Francesco Palmieri ; Alessandra Budillon
Spline Recurrent Neural Networks for Quad-Tree Video Coding / Lorenzo Topi ; Raffaele Parisi ; Aurelio Uncini
MLP Neural Network Implementation on a SIMD Architecture / Salvatore Vitabile ; Antonio Gentile ; G. B. Dammone ; Filippo Sorbello
Image and Signal Processing
A New Approach to Detection of Muscle Activation by Independent Component Analysis and Wavelet Transform / Bruno Azzerboni ; Giovanni Finocchio ; Maurizio Ipsale ; Fabio La Foresta ; Francesco Carlo Morabito
Learning to Balance Upright Posture: What can be Learnt Using Adaptive NN Models? / N. Alberto Borghese
Detection of Facial Features / Paola Campadelli ; Elena Casiraghi ; Raffaella Lanzarotti
A Two Stage Neural Architecture for Segmentation and Superquadrics Recovery from Range Data / Antonio Chella ; Roberto Pirrone
Automatic Discrimination of Earthquakes and False Events in Seismological Recording for Volcanic Monitoring / E. C. Ezin ; Flora Giudicepietro ; Simona Petrosino ; S. Scarpetta ; A. Vanacore
A Comparison of Signal Compression Methods by Sparse Solution of Linear Systems / Davide Mattera ; Michele Di Monte
Fuzzy Time Series for Forecasting Pollutants Concentration in the Air / Mario Versaci
Real-Time Perceptual Coding of Wideband Speech by Competitive Neural Networks / Eros Pasero ; Alfonso Montuori
Sound Synthesis by Flexible Activation Function Recurrent Neural Networks
Special Session on "Learning in Neural Networks: Limitations and Future Trends" Chaired by Marco Gori Mathematical Modelling of Generalization / Martin Anthony
Structural Complexity and Neural Networks / Alberto Bertoni ; Beatrice Palano
Bayesian Learning Techniques: Application to Neural Networks with Constraints on Weight Space / A. Eleuteri ; R. Tagliaferri ; L. Milano ; F. Acernese ; M. De Laurentiis
A Short Review of Statistical Learning Theory
Author Index / Domenico Parisi
Review Papers
Ensembles of Learning Machines / Giorgio Valentini ; Francesco Masulli
Speaker Model and Decision Threshold Updating in Speaker Verification / M. Mehdi Homayounpour
Application of Constraint Hierarchy to Timetabling Problems / Tatyana Yakhno ; Evren Tekin
An Intelligent System for Therapy Control in a Distributed Organization / José Joaquín Cañadas ; Isabel María del Águila ; Alfonso Bosch ; Samuel Túnez
Data Mining
Discovering Local Patterns from Multiple Temporal Sequences / Xiaoming Jin ; Yuchang Lu ; Chunyi Shi
The Geometric Framework for Exact and Similarity Querying XML Data / Michal Krátký ; Jaroslav Pokorný ; Tomáš Skopal ; Václav Snášel
A Mobile System for Extracting and Visualizing Protein-Protein Interactions / Kyungsook Han ; Hyoungguen Kim
Discovering Temporal Relation Rules Mining from Interval Data / Jun Wook Lee ; Yong Joon Lee ; Hey Kyu Kim ; Bu Hun Hwang ; Keun Ho Ryu
Multimedia I
An Abstract Image Representation Based on Edge Pixel Neighborhood Information (EPNI) / Abdolah Chalechale ; Alfred Mertins
Motion Estimation Based on Temporal Correlations / H.S. Yoon ; G.S. Lee ; S.H. Kim ; J.Y. Chang
A New Boundary Matching Algorithm Based on Edge Detection / NamRye Son ; YoJin Yang ; GueeSang Lee ; SungJu Park
Lookmark: A 2.5D Web Information Visualization System / Christian Breiteneder ; Horst Eidenberger ; Geert Fiedler ; Markus Raab
Artificial Intelligence II
Different Local Search Algorithms in STAGE for Solving Bin Packing Problem / Saeed Bagheri Shouraki ; Gholamreza Haffari
A Prototype for Functionality Based Network Management System / V. Neelanarayanan ; N. Satyanarayana ; N. Subramanian ; E. Usha Rani
Coaching a Soccer Simulation Team in RoboCup Environment / J. Habibi ; E. Chiniforooshan ; A. HeydarNoori ; M. Mirzazadeh ; M.A. Safari ; H.R. Younesy
Security I
Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme / Dongyang Long
A New Scheme Based on Semiconductor Lasers with Phase-Conjugate Feedback for Cryptographic Communications / A. Iglesias
Parallel Algorithm and Architecture for Public-Key Cryptosystem / Hyun-Sung Kim ; Kee-Young Yoo
Specification and Verification of Security Policies in Firewalls / Rasool Jalili ; Mohsen Rezvani
Multimedia II
Image Segmentation Based on Shape Space Modeling / Daehee Kim ; Yo-Sung Ho
HERMES: File System Support for Multimedia Streaming in Information Home Appliance / Youjip Won ; Jinyoun Park ; Sangback Ma
Motion Vector Recovery for Error Concealment Based on Macroblock Distortion Modeling / Jae-Won Suh
A Memory Copy Reduction Scheme for Networked Multimedia Service in Linux Kernel / JeongWon Kim ; YoungUhg Lho ; YoungJu Kim ; KwangBaek Kim ; SeungWon Lee
Neural Network
Hidden Markov Model and Neural Network Hybrid / Dongsuk Yook
Neural Network Based Algorithms for IP Lookup and Packet Classification / Mehran Mahramian ; Nasser Yazdani ; Karim Faez ; Hassan Taheri
Non-linear Prediction of Speech Signal Using Artificial Neural Nets / K. Ashouri ; M. Amini ; M.H. Savoji
Security II
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server / Won Bo Shim ; Seog Park
Development of UML Descriptions with USE / Martin Gogolla ; Mark Richters
FPGA Implementation of Digital Chaotic Cryptography / Dewi Utami ; Hadi Suwastio ; Bambang Sumadjudin
Multimedia III
Stereo for Recovering Sharp Object Boundaries / Jeonghee Jeon ; Choongwon Kim
Priority Vantage Points Structures for Similarity Queries in Metric Spaces / Cengiz Celik
A High Performance Image Coding Using Uniform Morphological Sampling, Residues Classifying, and Vector Quantization / Saeid Saryazdi ; Mostafa Jafari
A Genetic Algorithm for Steiner Tree Optimization with Multiple Constraints Using Prüfer Number / A.T. Haghighat ; K. Faez ; M. Dehghan ; A. Mowlaei ; Y. Ghahremani
Data and Knowledge Engineering I
A New Technique for Participation of Non-CORBA Independent Persistent Objects in OTS Transactions / Mohsen Sharifi ; S.F. Noorani ; F. Orooji
Compositional Modelling of Workflow Processes / Khodakaram Salimifard ; Mike B. Wright
EDMIS: Metadata Interchange System for OLAP / In-Gi Lee ; Minsoo Lee ; Hwan-Seung Yong
An Efficient Method for Controlling Access in Object-Oriented Databases / Woochun Jun ; Le Gruenwald
XML I
Extracting Information from XML Documents by Reverse Generating a DTD / Jong-Seok Jung ; Dong-Ik Oh ; Yong-Hae Kong ; Jong-Keun Ahn
Mapping XML-Schema to Relational Schema / Sun Hongwei ; Zhang Shusheng ; Zhou Jingtao ; Wang Jing
Flexible Modification of Relational Schema by X2RMap in Storing XML into Relations / Jaehoon Kim
B2B Integration - Aligning ebXML and Ontology Approaches / Birgit Hofreiter ; Christian Huemer
Mobile Communication I
An Agent Based Service Discovery Architecture for Mobile Environments / Zhou Wang ; Jochen Seitz
Location Management Using Multicasting HLR in Mobile Networks / Dong Chun Lee
Packet Error Probability of Multi-carrier CDMA System in Fast/Slow Correlated Fading Plus Interference Channel / Jae-Sung Roh ; Chang-Heon Oh ; Heau-Jo Kang ; Sung-Joon Cho
Computer Graphics
A Distributed Low-Cost Dynamic Multicast Routing Algorithm with Delay Constraints / Min-Woo Shin ; Nak-Keun Joo ; Hyeong-Seok Lim
A New Bandwidth Reduction Method for Distributed Rendering Systems / Won-Jong Lee ; Hyung-Rae Kim ; Woo-Chan Park ; Jung-Woo Kim ; Tack-Don Han ; Sung-Bong Yang
Neural Networks Based Mesh Generation Method in 2-D / Çinar Ahmet ; Arslan Ahmet
Anaphoric Definitions in Description Logic / Maarten Marx ; Mehdi Dastani
Storage and Querying of High Dimensional Sparsely Populated Data in Compressed Representation / Abu Sayed M. Latiful Hoque
The GlobData Fault-Tolerant Replicated Distributed Object Database / Luís Rodrigues ; Hugo Miranda ; Ricardo Almeida ; João Martins ; Pedro Vicente
XML II
A Levelized Schema Extraction for XML Document Using User-Defined Graphs / Sungrim Kim ; Yong-ik Yoon
Extracting, Interconnecting, and Accessing Heterogeneous Data Sources: An XML Query Based Approach / Gilles Nachouki ; Mohamed Quafafou
Mobile Communication II
Call Admission Control in Cellular Mobile Networks: A Learning Automata Approach / Hamid Beigy ; M.R. Meybodi
An Adaptive Flow Control Scheme for Improving TCP Performance in Wireless Internet / Seung-Joon Seok ; Sung-Min Hong ; Chul-Hee Kang
An Adaptive TCP Protocol for Lossy Mobile Environment / Choong Seon Hong ; YingXia Niu ; Jae-Jo Lee
Design and Implementation of Application-Level Multicasting Services over ATM Networks / Sung-Yong Park ; Jihoon Yang ; Yoonhee Kim
Digital Libraries and Natural Language Issues
Bon: The Persian Stemmer / Masoud Tashakori ; Mohammadreza Meybodi ; Farhad Oroumchian
Current and Future Features of Digital Journals / Harald Krottmaier
Solving Language Problems in a Multilingual Digital Library Federation / Nieves R. Brisaboa ; José R. Paramá ; MiguelR. Penabad ; Ángeles S. Places ; Francisco J. Rodríguez
Internet and Quality of Service
Performing IP Lookup on Very High Line Speed / Nazila Salimi
A Study of Marking Aggregated TCP and UDP Flows Using Generalized Marking Scheme
Information Society
Towards the Global Information Society: The Enactment of a Regulatory Framework as a Factor of Transparency and Social Cohesion / Panagiotes S. Anastasiades
E-learning
On the Application of the Semantic Web Concepts to Adaptive E-learning / Juan M. Santos ; Luis Anido ; Martín Llamas ; Judith S. Rodríguez
An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm / Stelios Xinogalos ; Maya Satratzemi
The Current Legislation Covering E-learning Provisions for the Visually Impaired in the EU / Hamid Jahankhani ; John A. Lynch ; Jonathan Stephenson
Mobile Communication III
Monte Carlo Soft Handoff Modeling / Alexey S. Rodionov ; Hyunseung Choo
A QoS Provision Architecture for Mobile IPv6 over MPLS Using HMAT / Zhao Wei Qu ; Sungyoung Lee
A New Propagation Model for Cellular Mobile Radio Communications in Urban Environments Including Tree Effects / Reza Arablouei ; Ayaz Ghorbani
Mobile Web Information Systems
A Secure Mobile Agent System Applying Identity-Based Digital Signature Scheme / Seongyeol Kim ; Ilyong Chung
Transmission Time Analysis of WAP over CDMA System Using Turbo Code Scheme / Il-Young Moon
On the Use of New Technologies in Health Care / Fernando Aguado ; Olga Folgueiras ; Manuel Caeiro
Wireless Communication Technology I
Hybrid Queuing Strategy to Reduce Call Blocking in Multimedia Wireless Networks / Il-Sun Hwang ; Robert Young Chul Kim
A Dynamic Backoff Scheme to Guarantee QoS over IEEE 802.11 Wireless Local Area Networks / Kil-Woong Jang ; Sung-Ho Hwang ; Ki-Jun Han
Performance Evaluation of Serial/Parallel Block Coded CDMA Systemwith Complex Spreading in Near/Far Multiple-Access Interference and Multi-path Nakagami Fading Channel / Choon-Gil Kim
A Learning Automata Based Dynamic Guard Channel Scheme
Web-Based Application
Dynamic System Simulation on the Web / Khaled Mahbub ; M.S.J. Hashmi
Using Proximity Information for Load Balancing in Geographically Distributed Web Server Systems / Dheeraj Sanghi ; Pankaj Jalote ; Puneet Agarwal
Strategie Tool for Assessment of the Supply and Demand Relationship between ASPs and SMEs for Competitive Advantage / Babak Akhgar ; Jawed Siddiqi ; Mehrdad Naderi
Intelligent Agents I
Trust and Commitment in Dynamic Logic / Jan Broersen ; Zhisheng Huang ; Leendert van der Torre
Modelling Heterogeneity in Multi Agent Systems / Stefania Bandini ; Sara Manzoni ; Carla Simone
Pricing Agents for a Group Buying System / Yong Kyu Lee ; Shin Woo Kim ; Min Jung Ko ; Sung Eun Park
Evolution of Cooperation in Multiagent Systems / Brian Mayoh
Real-Time Systems
A Dynamic Window-Based Approximate Shortest Path Re-computation Method for Digital Road Map Databases in Mobile Environments / Jaehun Kim ; Sungwon Jung
Web-Based Process Control Systems: Architectural Patterns, Data Models, and Services / Mykola V. Tkachuk ; Heinrich C. Mayr ; Dmytro V. Kuklenko ; MichailD. Godlevsky
A Comparison of Techniques to Estimate Response Time for Data Placement / Shahram Ghandeharizadeh ; Shan Gao ; Chris Gahagan
Using a Real-Time Web-Based Pattern Recognition System to Search for Component Patterns Database / Sung-Jung Hsiao ; Kuo-Chin Fan ; Wen-Tsai Sung ; Shih-Ching Ou
Wireless Communication Technology II
An Adaptive Call Admission Control to Support Flow Handover in Wireless Ad Hoc Networks / Joo-Hwan Seo
Design of Optimal LA in Personal Communication Services Network Using Simulated Annealing Technique / Madhubanti Maitra ; Ranjan Kumar Pradhan ; Debasish Saha ; Amitava Mukherjee
Secure Bluetooth Piconet Using Non-anonymous Group Key / Dae-Hee Seo ; Im-Yeong Lee ; Dong-ik Oh ; Doo-soon Park
Differentiated Bandwidth Allocation and Power Saving for Wireless Personal Area Networks / Tae-Jin Lee ; Yongsuk Kim
Software Engineering I
Combining Extreme Programming with ISO 9000 / Jerzy R. Nawrocki ; Michał Jasiñski ; Bartosz Walter ; Adam Wojciechowski
The Class Cohesion Using the Reference Graph G1 and G2 / Wan-Kyoo Choi ; Il-Yong Chung Sung-Joo Lee ; Hong-Sang Yoon
Process-Oriented Interactive Simulation of Software Acquisition Projects / Tobias Häberlein ; Thomas Gantner
Automatic Design Patterns Identification of C++ Programs / Félix Agustín Castro Espinoza ; Gustavo Núñez Esquer ; Joel Suárez Cansino
Intelligent Agents II
Specifying the Merging of Desires into Goals in the Context of Beliefs
The Illegal Copy Protection Using Hidden Agent / Deok-Gyu Lee
Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System / Tae-Kyung Kim ; Dong-Young Lee ; T.M. Chung
Algorithm and Computer Theory
H-Colorings of Large Degree Graphs / Josep Díaz ; Jaroslav Nešetřil ; Maria Serna ; Dimitrios M. Thilikos
Hyper-Star Graph: A New Interconnection Network Improving the Network Cost of the Hypercube / Hyeong-Ok Lee ; Jong-Seok Kim ; Eunseuk Oh
Sequential Consistency as Lazy Linearizability / Michel Raynal
Embedding Full Ternary Trees into Recursive Circulants / Cheol Kim ; Jung Choi
Wireless Communication Technology III
A Handoff Priority Scheme for TDMA/FDMA-Based Cellular Networks / Sun-Woo Lee
On Delay Times in a Bluetooth Piconet: The Impact of Different Scheduling Policies / Jelena Mišić ; Vojislav B. Mišić
Intelligent Paging Strategy in 3G Personal Communication Systems / I. Saha Misra ; S. Karmakar ; M.S. Mahapatra ; P.S. Bhattacharjee ; D. Saha ; A. Mukhertjee
Experience from Mobile Application Service Framework in WIP / Shinyoung Lim ; Youjin Song
An Efficient Approach to Improve TCP Performance over Wireless Networks / Satoshi Utsumi ; Salahuddin M.S. Zabir ; Norio Shiratori
Extended Hexagonal Constellations as a Means of Multicarrier PAPR Reduction / Ali Pezeshk ; Babak H. Khalaj
Software Engineering II
Adaptive Application-Centric Management in Meta-computing Environments
The Weakest Failure Detector for Solving Election Problems in Asynchronous Distributed Systems / Sung-Hoon Park
From Lens to Flow Structure / David Fauthoux ; Jean-Paul Bahsoun
ADML: A Language for Automatic Generation of Migration Plans / Jennifer Pérez ; José A. Carsí ; Isidro Ramos
Considerations for Using Domain-Specific Modeling in the Analysis Phase of Software Development Process / Kalle Korhonen
Organizations and Normative Agents / Virginia Dignum ; Frank Dignum
A Framework for Agent-Based Software Development / Behrouz Homayoun Far
Application of Agent Technologies in Extended Enterprise Production Planning / V. Marík ; M. Pechoucek ; J. Vokrínek ; A. Ríha
Zamin: An Artificial Ecosystem / Ramin Halavati
Author Index
Artificial Intelligence I
Speaker Model and Decision Threshold Updating in Speaker Verification / M. Mehdi Homayounpour
Application of Constraint Hierarchy to Timetabling Problems / Tatyana Yakhno ; Evren Tekin
Program Generation, Termination, and Binding-Time Analysis / Neil D. Jones ; Arne J. Glenstrup
Generative Programming for Embedded Systems / Janos Sztipanovits ; Gabor Karsai
Regular Papers
Self Reflection for Adaptive Programming / Giuseppe Attardi ; Antonio Cisternino
DataScript - A Specification and Scripting Language for Binary Data / Godmar Back
Memoization in Type-Directed Partial Evaluation / Vincent Balat ; Olivier Danvy
A Protocol Stack Development Tool Using Generative Programming / Michel Barbeau ; Francis Bordeleau
Building Composable Aspect-Specific Languages with Logic Metaprogramming / Johan Brichau ; Kim Mens ; Kris De Volder
Architectural Refactoring in Framework Evolution: A Case Study / Greg Butler
Towards a Modular Program Derivation via Fusion and Tupling / Wei-Ngan Chin ; Zhenjiang Hu
Generative Programming for Embedded Software: An Industrial Experience Report / Krzysztof Czarnecki ; Thomas Bednasch ; Peter Unger ; Ulrich Eisenecker
A Framework for the Detection and Resolution of Aspect Interactions / Remi Douence ; Pascal Fradet ; Mario Sudholt
Aspect-Oriented Modeling: Bridging the Gap between Implementation and Design / Tzilla Elrad ; Omar Aldawud ; Atef Bader
Macros That Compose: Systematic Macro Programming / Oleg Kiselyov
Program Termination Analysis in Polynomial Time / Chin Soon Lee
Generators for Synthesis of QoS Adaptation in Distributed Real-Time Embedded Systems / Sandeep Neema ; Ted Bapty ; Jeff Gray ; Aniruddha Gokhale
Optimizing Content Management System Pipelines (Separation and Merging of Concerns) / Markus Noga ; Florian Krüper
Component-Based Programming for Higher-Order Attribute Grammars / João Saraiva
Security of Public Watermarking Schemes for Binary Sequences / Qiming Li ; Ee-Chien Chang
Watermarking Algorithms I / Hyoung Joong KimSession 4:
Direct Embedding and Detection of RST Invariant Watermarks / Peter A. Fletcher ; Kieran G. Larkin
Robust Image Watermark Using Radon Transform and Bispectrum Invariants / Hyung-Shin Kim ; Yunju Baek ; Heung-Kyu Lee ; Young-Ho Suh
Audio Watermark Robustness to Desynchronization via Beat Detection / Darko Kirovski ; Hagai Attias
Watermarking Algorithms II / Ton KalkerSession 5:
Robust Watermarking and Affine Registration of 3D Meshes / Oliver Benedens
Natural Language Watermarking and Tamperproofing / Mikhail J. Atallah ; Victor Raskin ; Christian F. Hempelmann ; Mercan Karahan ; Radu Sion ; Umut Topkara ; Katrina E. Triezenberg
Attacks on Watermarking Algorithms / Fabien A. P. PetitcolasSession 6:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection / Tri Van Le ; Yvo Desmedt
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks / M. Kivanc Mihcak ; Ramarathnam Venkatesan ; Mustafa Kesal
Detectors for Echo Hiding Systems / Scott Craver ; Bede Liu ; Wayne Wolf
Linear Complexity and Related Complexity Measures for Sequences / H. Niederreiter
Forensic Computing / X. Li ; J. Seberry
Stream Cipher
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation / P. Sarkar
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator / S. Paul ; B. Preneel
Block Cipher
Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA / H.M. Yildirim
Impossible Differential Cryptanalysis for Block Cipher Structures / J. Kim ; S. Hong ; J. Sung ; S. Lee ; J. Lim ; S. Sung
Impossible Differential Attack on 30-Round SHACAL-2 / G. Kim ; C. Lee
Boolean Function
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria / K.C. Gupta
Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria / S. Kavut ; M.D. Yücel
Secrect Sharing
On Multiplicative Linear Secret Sharing Schemes / V. Nikov ; S. Nikova
A New (2,n)-Visual Threshold Scheme for Color Images / A. Adhikari ; S. Sikdar
On the Power of Computational Secret Sharing / V. Vinod ; A. Narayanan ; K. Srinathan ; C.P. Rangan ; K. Kim
Bilinear Pairing
Identity-Based Broadcasting / Y. Mu ; W. Susilo ; Y.-X. Lin
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings / F. Zhang ; R. Safavi-Naini
Extending Joux's Protocol to Multi Party Key Agreement / R. Barua ; R. Dutta
Public Key
Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups / P.J. Abisha ; D.G. Thomas ; K.G. Subramanian
Prime Numbers of Diffie-Hellman Groups for IKE-MODP / I. Yie ; S. Lim ; S. Kim ; D. Kim
Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems / F. Levy-dit-Vehel ; L. Perret
Signature Scheme
Security Analysis of Several Group Signature Schemes / G. Wang
Forking Lemmas for Ring Signature Schemes / J. Herranz ; G. Saez
Protocol
Practical Mental Poker Without a TTP Based on Homomorphic Encryption / J. Castellà-Roca ; J. Domingo-Ferrer ; A. Riera ; J. Borrell
Lightweight Mobile Credit-Card Payment Protocol / S. Kungpisdan ; B. Srinivasan ; P.D. Le
Elliptic Curve & Algebraic Geometry
On the Construction of Prime Order Elliptic Curves / E. Konstantinou ; Y.C. Stamatiou ; C. Zaroliagis
Counting Points on an Abelian Variety over a Finite Field / F.A. Izadi ; V.K. Murty
Implementation & Digital Watermarking
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication / K. Okeya ; D.-G. Han
Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm) / G. Bertoni ; J. Guajardo ; G. Orlando
Cryptanalysis of Block Based Spatial Domain Watermarking Schemes / T.K. Das
Authentication
More Efficient Password Authenticated Key Exchange Based on RSA / D.S. Wong ; A.H. Chan ; F. Zhu
A Password-Based Authenticator: Security Proof and Applications / Y. Hitchcock ; Y.S.T. Tin ; J.M. Gonzalez-Nieto ; C. Boyd ; P. Montague
Stronger Security Bounds for OMAC, TMAC, and XCBC / T. Iwata ; K. Kurosawa
Progressive Verification: The Case of Message Authentication / M. Fischlin
Author Index
Invited Talks
Linear Complexity and Related Complexity Measures for Sequences / H. Niederreiter
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack / C. Cowan ; S. Arnold ; S. Beattie ; C. Wright ; J. Viega
Cyber Panel
Finding the Vocabulary of Program Behavior Data for Anomaly Detection / C. Michael
Detecting Spoofed Packets / S. Templeton ; K. Levitt
Modeling Multistep Cyber Attacks for Scenario Recognition / S. Cheung ; U. Lindqvist ; M. Fong
Cooperative Response Strategies for Large Scale Attack Mitigation / D. Nojiri ; J. Rowe
Dynamic Coalitions (DC)
Dynamic Authorization and Intrusion Response in Distributed Systems / T. Ryutov ; C. Neuman ; D. Kim
The STRONGMAN Architecture / A. Keromytis ; S. Ioannidis ; M. Greenwald ; J. Smithy
Dynamic PKI and Secure Tuplespaces for Distributed Coalitions / T. Smith ; G. Byrd ; X. Wu ; H. Xin ; K. Thangavelu ; R. Wang ; A. Shah
RT: A Role-Based Trust-Management Framework / N. Li ; J. Mitchell
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer / Y. Amir ; C. Nita-Rotaru ; J. Stanton ; G. Tsudik
MuCAPSL / J. Millen ; G. Denker
Leader Election Algorithms for Wireless Ad Hoc Networks / S. Vasudevan ; B. DeCleene ; N. Immerman ; J. Kurose ; D. Towsley
Fault Tolerant Networking (FTN)
COSSACK: Coordinated Suppression of Simultaneous Attacks / C. Papadopoulos ; R. Lindell ; J. Mehringer ; A. Hussain ; R. Govindan
NetBouncer: Client-Legitimacy-Based High-Performance DDoS Filtering / R. Thomas ; B. Mark ; T. Johnson ; J. Croall
Analyzing Interaction between Distributed Denial of Service Attacks and Mitigation Technologies / W. Blackert ; D. Gregg ; A. Castner ; E. Kyle ; R. Hom ; R. Jokerst
Design and Analysis of an IP-Layer Anonymizing Infrastructure / H. Kung ; C. Cheng ; K. Tan ; S. Bradner
Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security / S. Murphy ; A. Hayatnagarkar ; S. Krishnaswamy ; W. Morrison
Understanding BGP Behavior through a Study of DoD Prefixes / X. Zhao ; D. Massey ; S. Wu ; M. Lad ; D. Pei ; L. Wang ; L. Zhang
Efficient Alarm Management in Optical Networks / S. Stanic ; S. Subramaniam ; H. Choi ; G. Sahin
Interactions Between TCP and the IEEE 802.11 MAC Protocol / R. Jiang ; V. Gupta ; C. Ravishankar
Statistical Approaches to DDoS Attack Detection and Response / L. Feinstein ; D. Schnackenberg ; R. Balupari ; D. Kindred
Organic and Survivable Information Systems (OASIS)
Towards a Rigorous Definition of Information System Survivability / J. Knight ; E. Strunk ; K. Sullivan
Intrusion Tolerance via Network Layer Controls / D. O'Brien ; R. Smith ; T. Kappel ; C. Bitzer
Operational Experimentation (OPX)
Lessons Learned in Using Live Red Teams in IA Experiments / D. Levin
Surveillance Detection in High Bandwidth Environments / S. Robertson ; E. Siegel ; M. Miller ; S. Stolfo
Detecting Novel Scans through Pattern Anomaly Detection / A. Valdes
Author Index
DARPA Information Survivability Conference and Exposition--DISCEX 2003 / Volume II:
Foreword
Acknowledgments
Demonstration Abstracts / Part I:
Open-Source PKI on SELinux--A Technology Description / E. Bubnis ; S. Evans ; P. Fischer ; E. Meighan ; A. Almeida
Demonstration of COSAK Static Analysis Tools / D. DaCosta ; C. Dahn ; S. Mancoridis ; V. Prevelakis
MYSEA Technology Demonstration / C. Irvine ; D. Shifflett ; P. Clark ; T. Levin ; G. Dinolt
The TrustedBSD MAC Framework
Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches / A. D'Amico ; S. Salas
A Controller-Based Autonomic Defense System / D. Armstrong ; S. Carter ; G. Frazier ; T. Frazier
Scyllarus Intrusion Detection Report Correlator and Analyzer / W. Heimerdinger
System Health and Intrusion Monitoring: Technology Description / C. Ko
CIRCADIA Demonstration: Active Adaptive Defense / D. Musliner
An Integrated Cyber Panel System / L. Tinnel ; O. Saydjari ; J. Haines
Intelligence Preparation of the Information Battlespace (IPIB) / J. Williams
Integrated Security Services for Dynamic Coalitions / H. Khurana ; S. Gavrila ; R. Bobba ; R. Koleva ; A. Sonalker ; E. Dinu ; V. Gligor ; J. Baras
Key Management for Secure Multicast Group Communication in Mobile Networks / T. Kostas ; D. Kiwior ; G. Rajappan ; M. Dalal
Antigone: Policy-Based Secure Group Communication System and AmirD: Antigone-Based Secure File Mirroring System / J. Irrer ; A. Prakash ; P. McDaniel
Federated Security Management for Dynamic Coalitions / S. Bhatt ; S. Rajagopalan ; P. Rao
TrustBuilder: Negotiating Trust in Dynamic Coalitions / K. Seamons ; T. Chan ; E. Child ; M. Halcrow ; A. Hess ; J. Holt ; J. Jacobson ; R. Jarvis ; A. Patty ; B. Smith ; T. Sundelin ; L. Yu
Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed Coalitions
A Toolkit for Building Secure, Fault-Tolerant Virtual Private Networks / W. Stephens ; B. Coan ; S. Narain ; V. Kaul ; K. Parmeswaran ; T. Cheng
Distributed Data Authentication / M. Goodrich ; M. Shin ; C. Straub ; R. Tamassia
Automated Trust Negotiation Technology with Attribute-Based Access Control / W. Winsborough ; J. Jacobs
Fault Tolerant Networks (FTN)
The Wackamole Approach to Fault Tolerant Networks / R. Caudy ; A. Munjal ; T. Schlossnagle ; C. Tutu
Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA)
NCAC: Network Congestion Analyzer and Controller
DDoS Tolerant Networks
Guaranteed Internet Stack Utilization (GINSU) Building Blocks / R. Knobbe ; A. Purtell
ANON: An IP-Layer Anonymizing Infrastructure
Distributed Embedded Firewalls with Virtual Private Groups / T. Markham ; L. Meredith ; C. Payne
Fault-Tolerant Mesh of Trust Applied to DNS Security / W. Griffin ; R. Mundy ; S. Weiler ; N. Vora
Demonstration of Fault Tolerance for CORBA Applications / L. Moser ; M. Melliar-Smith
Dynamic Trust-Based Resource Allocation / T. Hughes ; M. Junod ; P. Muckelbauer
Active Network Fault Response
Scalable DDoS Protection Using Route-Based Filtering / K. Park
Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA) / R. Ramanujan ; S. Kudige ; T. Nguyen
DefCOM: Defensive Cooperative Overlay Mesh / M. Robinson ; J. Mirkovic ; S. Michel ; M. Schnaider ; P. Reiher
Improving Failure Responsiveness in Jini Leasing / S. Rose ; K. Bowers ; S. Quirolgico ; K. Mills
SPIE Demonstration: Single Packet Traceback / W. Strayer ; C. Jones ; F. Tchakountio ; A. Snoeren ; B. Schwartz ; R. Clements ; M. Condell ; C. Partridge
Onion Routing for Resistance to Traffic Analysis / P. Syverson
TetherNet Anti-NAT--Secure Internet Subnet Rental System / H. Zhu ; T. Huck ; J. Touch ; L. Eggert ; Y. Wang
Organically Assured and Survivable Information Systems (OASIS)
Safe Email, Safe Office, and Safe Web Browser / R. Balzer
Access Control on the Web Using Proof-Carrying Authorization / L. Bauer ; M. Schneider ; E. Felten ; A. Appel
Enterprise Wrappers for Information Assurance / M. Feldman
Willow System Demonstration / J. Hill ; P. Varner ; A. Wolf ; D. Heimbigner ; P. Devanbu
Camouflage of Network Traffic to Resist Attack (CONTRA) / W. Weinstein ; J. Lepanto
Dependable Intrusion Tolerance: Technology Demo / M. Almgren ; Y. Deswarte ; B. Dutertre ; J. Levy ; H. Saidi ; V. Stavridou ; T. Uribe
ITDB: An Attack Self-Healing Database System Prototype / P. Liu
Intrustion Tolerant Web Servers via Network Layer Controls
Demonstrating Intrusion Tolerance with ITUA / P. Pal
VPNshield: Protecting VPN Services from Denial-of-Service (DoS) Attacks / M. Kaddoura ; J. Wu ; C. Sanders ; K. Millikin
On-Line Attack Prevention and Continual Recovery / J. Reynolds
An Aspect-Oriented Security Solution / V. Shah ; F. Hill
OmniVPN / J. Shukla
Efficient Code Certification for Open Firmware / M. Stillerman ; D. Kozen
Intrusion Tolerant Distributed Object Systems / G. Tally ; B. Whitmore ; D. Sames ; B. Matt ; B. Niebuhr ; D. Bakken
SPMA--Java Binary Enhancement Tool / T. Van Vleck ; A. Reisse
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services / F. Wang ; R. Uppalli
System Detection's Hawkeye Platform
Research Summaries / Part II:
Modeling Security-Enhanced Linux Policy Specifications for Analysis / M. Archer ; E. Leonard ; M. Pradella
Open-Source PKI on SELinux
Monterey Security Enhanced Architecture Project
Achieving Principled Assuredly Trustworthy Composable Systems and Networks / P. Neumann
Enhancing ReiserFS Security in Linux / H. Reiser
LLSIM: Network Simulation for Correlation and Response Testing / S. Goulet ; R. Durst ; T. Champion
System Health and Intrusion Monitoring (SHIM): Project Summary
Predicting the Impact of Cyber-Attacks on BMC[subscript 3] Enterprises / J. Shaw
A Framework for Automated Negotiation of Access Control Policies / V. Bharadwaj
Recommendations in Using Group Key Management Algorithms / W. Chen ; L. Dondeti
DyCER: A Lightweight Data Sharing System Using Replication / J. Kay ; S. Crocker
A Flexible Architecture for Security Policy Enforcement
Trust Negotiation in Dynamic Coalitions / M. Winslett ; T. Yu
Efficient and Scalable Infrastructure Support for Dynamic Coalitions
Automated Trust Negotiation in Attribute-Based Access Control
A Summary of the Autonomic Distributed Firewalls (ADF) Project
Traceback of Single IP Packets Using SPIE
DynaBone: Dynamic Defense Using Multi-Layer Internet Overlays / G. Finn
A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks / V. Mahadik ; D. Reeves
Engineering a Distributed Intrusion Tolerant Database System Using COTS Components
EMT/MET: Systems for Modeling and Detecting Errant Email / S. Hershkop ; K. Wang ; O. Nimeskern
Papers by Program Order / Volume I:
Composable High Assurance Trusted Systems (CHATS)
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems / Axel Schairer
Authentication and Trust
Authentication for Pervasive Computing / Sadie Creese ; Michael Goldsmith ; Bill Roscoe ; Irfan Zakiuddin
End-to-End Trust Starts with Recognition / Jean-Marc Seigneur ; Stephen Farrell ; Christian Damsgaard Jensen ; Elizabeth Gray ; Yong Chen
Embedding Distance-Bounding Protocols within Intuitive Interactions / Laurent Bussard and Yves Roudier
Secure Infrastructures
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments / Philip Robinson ; Michael Beigl
Time Constraint Delegation for P2P Data Decryption / Tie-Yan Li
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing / Kemal Bicakci ; Nazife Baykal
Smart Labels
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems / Stephen A. Weis ; Sanjay E. Sarma ; Ronald L. Rivest ; Daniel W. Engels
Verification
Implementing a Formally Verifiable Security Protocol in Java Card / Engelbert Hubbers ; Martijn Oostdijk ; Erik Poll
Hardware Architectures
Cellular Automata Based Multiplier for Public-Key Cryptosystem / Hyun-Sung Kim ; Kee-Young Yoo
Enlisting Hardware Architecture to Thwart Malicious Code Injection / Ruby B. Lee ; David K. Karig ; John P. McGregor ; Zhijie Shi
Optimized RISC Architecture for Multiple-Precision Modular Arithmetic / Johann Großschadl ; Guy-Armand Kamendje
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point Pradeep Kumar Mishra and Palash Sarkar 41
Fast Arithmetic on Jacobians of Picard Curves Stephane Flon and Roger Oyono 55
Undeniable Signatures Based on Characters: How to Sign with One Bit Jean Monnerat and Serge Vaudenay 69
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk 86
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model Huafei Zhu 101
Constant Round Authenticated Group Key Agreement via Distributed Computation Emmanuel Bresson and Dario Catalano 115
Efficient ID-based Group Key Agreement with Bilinear Maps Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee 130
New Security Results on Encrypted Key Exchange Emmanuel Bresson, Olivier Chevassut, and David Pointcheval 145
New Results on the Hardness of Diffie-Hellman Bits Maria Isabel Gonzalez Vasco, Mats Naeslung, and Igor E. Shparlinski 159
Short Exponent Diffie-Hellman Problems Takeshi Koshiba and Kaoru Kurosawa 173
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Benoit Libert and Jean-Jacques Quisquater 187
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 Nicolas T. Courtois 201
Secret Exponent Attacks on RSA-type Schemes with Moduli N=Prq Alexander May 218
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" Reihaneh Safavi-Naini, Luke McAven, and Moti Yung 231
From Digital Signature to ID-based Identification/Signature Kaoru Kurosawa and Swee-Huay Heng 248
Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 262
An Efficient Signature Scheme from Bilinear Pairings and Its Applications Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo 277
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka 291
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation Jintai Ding 305
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability Jun Furukawa 319
A Point Compression Method for Elliptic Curves Defined over GF(2n) Brian King 333
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny Toru Akishita and Tsuyoshi Takagi 346
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, and Hideki Imai 360
QuasiModo: Efficient Certificate Validation and Revocation Farid F. Elwailly, Craig Gentry, and Zulfikar Ramzan 375
A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga and Kouichi Sakurai 389
A First Approach to Provide Anonymity in Attribute Certificates Vicente Benjumea, Javier Lopez, Jose A. Montenegro, and Jose M. Troya 402
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups Igor E. Shparlinski and Arne Winterhof 416
Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, and Helger Lipmaa 425
A Correct, Private, and Efficient Mix Network Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan 439
Author Index 455
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
Enhanced Correlation in an Intrusion Detection Process / S. Benferhat ; F. Autrel ; F. Cuppens
Safeguarding SCADA Systems with Anomaly Detection / J. Bigham ; D. Gamez ; N. Lu
Experiments with Simulation of Attacks against Computer Networks / I. Kotenko ; E. Man'kov
Detecting Malicious Codes by the Presence of Their "Gene of Self-replication" / V.A. Skormin ; D.H. Summerville ; J.S. Moronski
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences / K. Wee ; B. Moon
Public Key Distribution, Authentication, Access Control
Distributed Access Control: A Logic-Based Approach / S. Barker
Advanced Certificate Status Protocol / D.H. Yum ; J.E. Kang ; P.J. Lee
Key History Tree: Efficient Group Key Management with Off-Line Members / A. Lain ; V. Borisov
A Certificate Status Checking Protocol for the Authenticated Dictionary / J.L. Munoz ; J. Forne ; O. Esparza ; M. Soriano
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach / R. Wolf ; M. Schneider
Cryptography
A Signcryption Scheme Based on Secret Sharing Technique / M. Al-Ibrahim
A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem / P. Caballero-Gil ; C. Hernández-Goya
Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property / Y.D. Ko ; D.J. Hong ; S.H. Hong ; S.J. Lee ; J.L. Lim
Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper / V. Korzhik ; V. Yakovlev ; A. Sinuk
On Cipher Design Based on Switchable Controlled Operations / N.A. Moldovyan
Elliptic Curve Point Multiplication / A. Rostovtsev ; E. Makhovenko
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation / N. Sklavos ; A.A. Moldovyan ; O. Koufopavlou
Steganography
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel / V. Gorodetsky ; V. Samoilov
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation / K. Zhang ; S. Wang ; X. Zhang
Digital Watermarking under a Filtering and Additive Noise Attack Condition / V. Korzhik, G ; . Morales-Luna ; I. Marakova ; C. Patino-Ruvalcaba
Data Hiding in Digital Audio by Frequency Domain Dithering
Steganography with Least Histogram Abnormality
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences
Short Papers
Authentication of Anycast Communication / A. Cerny
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy / R. Ando ; Y. Takefuji
Construction of the Covert Channels / A. Grusho ; E. Timonina
Privacy and Data Protection in Electronic Communications / L. Mitrou ; K. Moulinos
Multiplier for Public-Key Cryptosystem Based on Cellular Automata / H.S. Kim ; S.H. Hwang
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols / S. Kumar ; V. Marbukh
Alert Triage on the ROC / F.J. Martin ; E. Plaza
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 / N.D. Goots ; B.V. Izotov
Immunocomputing Model of Intrusion Detection / Y. Melnikov ; A. Tarakanov
Agent Platform Security Architecture / G. Santana ; L.B. Sheremetov ; M. Contreras
Support Vector Machine Based ICMP Covert Channel Attack Detection / T. Sohn ; T. Noh ; J. Moon
Computer Immunology System with Variable Configuration / S.P. Sokolova ; R.S. Ivlev
Author Index
Invited Papers
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park
Chosen-Ciphertext Security without Redundancy / Duong Hieu Phan ; David PointchevalPublic Key Cryptography I:
Some RSA-Based Encryption Schemes with Tight Security Reduction / Kaoru Kurosawa ; Tsuyoshi Takagi
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications / Emmanuel Bresson ; Dario Catalano
Factoring Estimates for a 1024-Bit RSA Modulus / Arjen Lenstra ; Eran Tromer ; Adi Shamir ; Wil Kortsmit ; Bruce Dodson ; James Hughes ; Paul LeylandNumber Theory I:
Index Calculus Attack for Hyperelliptic Curves of Small Genus / Nicolas Theriault
Efficient Implementations
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves / Pradeep Kumar Mishra ; Palash Sarkar
Key Management and Protocols / Iwan Duursma ; Hyang-Sook Lee ; David R. Kohel
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy / Miodrag J. Mihaljevic
Untraceable Fair Network Payment Protocols with Off-Line TTP / Chih-Hung Wang
Hash Functions
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking / Dwaine Clarke ; Srinivas Devadas ; Marten van Dijk ; Blaise Gassend ; G. Edward Suh
New Parallel Domain Extenders for UOWHF / Wonil Lee ; Donghoon Chang ; Sangjin Lee ; Soohak Sung ; Mridul Nandi
Cryptanalysis of 3-Pass HAVAL / Bart Van Rompay ; Alex Biryukov ; Bart Preneel ; Joos Vandewalle
Group Signatures
Efficient Group Signatures without Trapdoors / Giuseppe Ateniese ; Breno de Medeiros
Accumulating Composites and Improved Group Signing / Gene Tsudik ; Shouhuai Xu
Almost Uniform Density of Power Residues and the Provable Security of ESIGN / Tatsuaki Okamoto ; Jacques Stern
Rotations and Translations of Number Field Sieve Polynomials / Jason E. GowerNumber Theory II:
On Class Group Computations Using the Number Field Sieve / Mark L. Bauer ; Safuat Hamdy
Invited Talk
The Secret and Beauty of Ancient Chinese Padlocks / Hong-Sen Yan ; Hsing-Hui Huang
Block Ciphers
A Traceable Block Cipher / Olivier Billet ; Henri Gilbert
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / Chong Hee Kim ; Yong Ho Hwang ; Pil Joong Lee
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes / Nuttapong Attrapadung
Foundations and Complexity Theory
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption / Jean-Sebastien Coron ; David Naccache
On Diophantine Complexity and Statistical Zero-Knowledge Arguments / Helger Lipmaa
Verifiable Homomorphic Oblivious Transfer and Private Equality Test
Generalized Powering Functions and Their Application to Digital Signatures / Hisayoshi Sato ; Satoru Tezuka ; Kazuo TakaragiPublic Key Cryptography II:
Certificateless Public Key Cryptography / Sattam S. Al-Riyami ; Kenneth G. Paterson
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems / Katja Schmidt-Samoa
The Insecurity of Esign in Practical Implementations / Pierre-Alain Fouque ; Nick Howgrave-Graham ; Gwenaelle Martinet ; Guillaume Poupard
Digital Signature
Efficient One-Time Proxy Signatures / Huaxiong Wang ; Josef Pieprzyk
Universal Designated-Verifier Signatures / Ron Steinfeld ; Laurence Bull
Author Index
Chosen-Ciphertext Security without Redundancy / Duong Hieu Phan ; David PointchevalPublic Key Cryptography I:
Some RSA-Based Encryption Schemes with Tight Security Reduction / Kaoru Kurosawa ; Tsuyoshi Takagi
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications / Emmanuel Bresson ; Dario Catalano
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures / Ju-Sung Kang ; Seongtaek Chee ; Choonsik Park
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack / Hidema Tanaka ; Chikashi Ishii ; Toshinobu Kaneko
On MISTY1 Higher Order Differential Cryptanalysis / Steve Babbage ; Laurent Frisch
Difference Distribution Attack on DONUT and Improved DONUT / Dong Hyeon Cheon ; Seok Hie Hong ; Sang Jin Lee ; Sung Jae Lee ; Kyung Hwan Park ; Seon Hee Yoon
New Results on Correlation Immunity / Yuliang Zheng ; Xian-Mo Zhang
Elliptic Curves and Resilient Functions / Jung Hee Cheon
Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction / Ted Krovetz ; Phillip Rogaway
Characterization of Elliptic Curve Traces under FR-Reduction / Atsuko Miyaji ; Masaki Nakabayashi ; Shunzo Takano
A Multi-party Optimistic Non-repudiation Protocol / Olivier Markowitch ; Steve Kremer
Secure Matchmaking Protocol / Byoungcheon Lee ; Kwangjo Kim
An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA / Takeru Miyazaki
Efficient and Secure Member Deletion in Group Signature Schemes / Hyun-Jeong Kim ; Jong In Lim ; Dong Hoon Lee
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods / Feng Bao ; Robert H. Deng ; Peirong Feng
An Internet Anonymous Auction Scheme / Yi Mu ; Vijay Varadharajan
Micropayments for Wireless Communications / DongGook Park ; Colin Boyd ; Ed Dawson
Cryptographic Applications of Sparse Polynomials over Finite Rings / William D. Banks ; Daniel Lieman ; Igor E. Shparlinski ; Van Thuong To
Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors / Chanjoo Chung ; Seungbok Choi ; Dongho Won ; Youngchul Choi
Hash to the Rescue: Space Minimization for PKI Directories / Adam Young ; Moti Yung
A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management / Jae Seung Lee ; Sang Choon Kim ; Seung Won Sohn
Author Index
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures / Ju-Sung Kang ; Seongtaek Chee ; Choonsik Park
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack / Hidema Tanaka ; Chikashi Ishii ; Toshinobu Kaneko
On MISTY1 Higher Order Differential Cryptanalysis / Steve Babbage ; Laurent Frisch
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions / Yuliang Zheng ; Xian-Mo Zhang
Public Key Systems
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders / Detlef Huhnlein ; Michael J. Jacobson, Jr. ; Damian Weber
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields / Sachar Paulus
An Intelligent Decision Support System for Intrusion Detection and Response / Dipankar Dasgupta ; Fabio A. Gonzalez
Mathematical Models of the Covert Channels / Alexander Grusho
Open Issues in Formal Methods for Cryptographic Protocol Analysis / Catherine Meadows
Future Directions in Role-Based Access Control Models / Ravi Sandhu
Secure Networked Computing / Vijay Varadharajan
Network Security Systems: Foundations, Models, and Architectures Composability of Secrecy / Jan Jurjens
Agent-Based Model of Computer Network Security System: A Case Study / Vladimir I. Gorodetski ; O. Karsayev ; A. Khabalov ; I. Kotenko ; Leonard J. Popyack ; Victor A. Skormin
Security Considerations and Models for Service Creation in Premium IP Networks / Michael Smirnov
Secure Systems Design Technology / Peter D. Zegzhda ; Dmitry P. Zegzhda
A Privacy-Enhancing e-Business Model Based on Infomediaries / Dimitris Gritzalis ; Konstantinos Moulinos ; Konstantinos Kostis
Applying Practical Formal Methods to the Specification and Analysis of Security Properties / Constance Heitmeyer
Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ) / Andrey Kostogryzov
Analyzing Separation of Duties in Petri Net Workflows / Konstantin Knorr ; Harald Weidner
Intrusion Detection: Foundations and Models
Information Security with Formal Immune Networks / Alexander O. Tarakanov
BASIS: A Biological Approach to System Information Security / Jose G. Delgado-Frias ; Dennis L. McGee ; Joseph V. Giordano
Learning Temporal Regularities of User Behavior for Anomaly Detection / Alexandr Seleznyov ; Oleksiy Mazhelis ; Seppo Puuronen
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining / Harjit Singh ; Steven Furnell ; Benn Lines ; Paul Dowland
Access Control, Authentication, and Authorization
Typed MSR: Syntax and Examples / Iliano Cervesato
The Set and Function Approach to Modeling Authorization in Distributed Systems / Steve Barker ; Tatyana Ryutov ; Clifford Neuman
Fenix Secure Operating System: Principles, Models, and Architecture / Pavel G. Stepanov ; Alexey D. Otavin
Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods
Generalized Oblivious Transfer Protocols Based on Noisy Channels / Valeri Korjik ; Kirill Morozov
Controlled Operations as a Cryptographic Primitive / Boris V. Izotov ; Alexander A. Moldovyan ; Nick A. Moldovyan
Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes / Viktor Yakovlev ; Valery Korjik ; Alexander Sinuk
Dynamic Group Key Management Protocol / Ghassan Chaddoud ; Isabelle Chrisment ; Andre Schaff
SVD-Based Approach to Transparent Embedding Data into Digital Images / Vladimir Samoilov
Fast Encryption Algorithm Spectr-H64 / Nick D. Goots
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols / Antonio Durante ; Riccardo Focardi ; Roberto Gorrieri
On Some Cryptographic Properties of Rijndael / Selcuk Kavut ; Melek D. Yucel
Author Index
Invited Talks
An Intelligent Decision Support System for Intrusion Detection and Response / Dipankar Dasgupta ; Fabio A. Gonzalez
Mathematical Models of the Covert Channels / Alexander Grusho
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection / Joachim Biskup ; Ulrich Flegel
Data Mining
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions / Wenke Lee ; Rahul A. Nimbalkar ; Kam K. Yee ; Sunil B. Patil ; Pragneshkumar H. Desai ; Thuan T. Tran ; Salvatore J. Stolfo
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report / Christoph Michael ; Anup Ghosh
Modeling Process Behavior
Adaptive, Model-Based Monitoring for Cyber Attack Detection / Alfonso Valdes ; Keith Skinner
A Real-Time Intrusion Detection System Based on Learning Program Behavior / Anup K. Ghosh ; Michael Schatz
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects / Zakia Marrakchi ; Bernard Vivinis ; Benjamin Morin
IDS Evaluation
The 1998 Lincoln Laboratory IDS Evaluation (A Critique) / John McHugh
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation / Richard Lippmann ; Joshua W. Haines ; David J. Fried ; Jonathan Korba ; Kumar Das
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems / Dominique Alessandri
Modeling
LAMBDA: A Language to Model a Database for Detection of Attacks / Frederic Cuppens ; Rodolphe Ortalo
Target Naming and Service Apoptosis / James Riordan
Author Index
Logging
Better Logging through Formality / Chapman Flack ; Mikhail J. Atallah
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive / Kouichi Sakurai ; Tsuyoshi Takagi
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages / Jean-Sebastien Coron ; Helena Handschuh ; Marc Joye ; Pascal Paillier ; David Pointcheval ; Christophe Tymen
On Sufficient Randomness for Secure Public-Key Cryptosystems / Takeshi Koshiba
Multi-recipient Public-Key Encryption with Shortened Ciphertext / Kaoru Kurosawa
Signature Schemes
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code / Goichiro Hanaoka ; Junji Shikata ; Yuliang Zheng ; Hideki Imai
Formal Proofs for the Security of Signcryption / Joonsang Baek ; Ron Steinfeld
A Provably Secure Restrictive Partially Blind Signature Scheme / Greg Maitland ; Colin Boyd
Protocols I
M + 1-st Price Auction Using Homomorphic Encryption / Masayuki Abe ; Koutarou Suzuki
Client/Server Tradeoffs for Online Elections / Ivan Damgard ; Mads Jurik
A Comparison Study of the Behavior of Equivalent Algorithms in Fault Injection Experiments in Parallel Superscalar Architectures / Ioannis Vakalis
The Effectiveness of Statistical Testing when Applied to Logic Systems / Silke Kuball ; Gordon Hughes ; John H.R. May ; Julio Gallardo ; Andrew D. John ; Roy B. Carter
Formal Methods
A Classification Scheme for Software Verification Tools with Regard to RTCA/DO-178B / Gunther Zoffmann ; Manfred Gingerl ; Christian Reumann ; Gerald Sonneck
Safety Patterns - The Key to Formal Specification of Safety Requirements.. / Friedemann Bitsch
Formal Support for Fault Modeling and Analysis / Tadeusz Cichocki ; Janusz Górski
Project Experience with IEC 61508 and Its Consequences / Rainer Faller
Control Systems
About the Design of Distributed Control Systems: The Quasi-Synchronous Approach / Paul Caspi ; Christine Mazuet ; Natacha Reynaud Paligot
Dependability Evaluation - From Functional to Structural Modeling / Cláudia Betous-Almeida ; Karama Kanoun
Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems / Stefano Porcarelli ; Felicita Di Giandomenico ; Amine Chohra ; Andrea Bondavalli
Author Index
Invited Paper
Designing Safety into Medical Decisions and Clinical Processes / John Fox
Accurately Detecting Source Code of Attacks That Increase Privilege / Robert K. Cunningham ; Craig S. Stevenson
CDIS: Towards a Computer Immune System for Detecting Network Intrusions / Paul D. Williams ; Kevin P. Anchor ; John L. Bebo ; Gregg H. Gunsch ; Gary D. Lamont
Intrusion Tolerance
Autonomic Response to Distributed Denial of Service Attacks / Dan Sterne ; Kelly Djahandari ; Brett Wilson ; Bill Babson ; Dan Schnackenberg ; Harley Holliday ; Travis Reid
Legal Aspects
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information / Steven R. Johnston
Specification-Based IDS
Experiences with Specification-Based Intrusion Detection / Prem Uppuluri ; R. Sekar
System Health and Intrusion Monitoring Using a Hierarchy of Constraints / Calvin Ko ; Paul Brutch ; Jeff Rowe ; Guy Tsafnat ; Karl Levitt
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
Unconditionally-Secure Oblivious Transfer / Bo Yan ; Shixiong Zhu ; Yumin Wang
Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang ; Iuon-Chang Lin
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Kuo-Feng Hwang
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo ; Lincheng Shen ; Wensen Chang
A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki ; Fumitaka Hoshino ; Tetsutaro Kobayashi
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang ; Futai Zhang
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye ; Junhui Yang ; Zongduo Dai ; Haiwen Ou
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura
A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim ; Hae-Kyung Rhee ; Tai M. Chung ; Young Ik Eom ; Ung-Mo Kim
Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho ; Zbigniew Ciechanowicz
RBAC for XML Document Stores / Michael Hitchens ; Vijay Varadharajan
Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song ; Sihan Qing
Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono ; Ingo Liebhardt
Enforcing Obligation with Security Monitors / Carlos Ribeiro ; Andre Zuquete ; Paulo Ferreira
Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning ; Yiqun Lisa Yin
Playing Lottery on the Internet / Jianying Zhou ; Chunfu Tan
Privacy Protection for Transactions of Digital Goods / Feng Bao ; Robert Deng
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lua Xu ; Han-liang Xu ; Yan Wang ; Shu-Wang Lu
Threshold Undeniable RSA Signature Scheme / Guilin Wang ; Mingsheng Wang ; Zhanfei Zhou
Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang ; Cheng-Chi Lee ; Yuan-Liang Tang
Square Attack on Reduced Camellia Cipher / Yeping He
Generalization of Elliptic Curve Digital Signature Schemes / Lin You ; Yi Xian Yang ; Chun Qi Zhang
Reasoning about Accountability within Delegation / Bruno Crispo ; Giancarlo Ruffo
A Novel Data Hiding Method for Two-Color Images / Gang Pan ; Yijun Wu ; Zhaohui Wu
An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee ; X. Deng ; H. Zhu
Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu ; Yoshiaki Takata ; Hiroyuki Seki ; Katsuro Inoue
Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang ; Harald Lukhaub ; Werner Zorn
A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp ; Chaiwat Rujimethabhas
Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen ; Adam Bargteil ; David Bindel ; Randy H. Katz ; John Kubiatowicz
A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto ; Colin Boyd ; Ed Dawson
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong ; Chul Kim
NIDS Research Based on Artificial Immunology / Wenjian Luo ; Xianbin Cao ; Xufa Wang
AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Cánovas ; Antonio F. Gómez
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou ; Byrav Ramamurthy ; Spyros S. Magliveras
Dispatching Mobile Agents with Secure Routes in Parallel / Kian-Lee Tan
TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen ; Qian Fang ; Zhihui Du ; Zhenchun Huang ; Sanli Li
Cryptography and Middleware Security / Ulrich Lang ; Dieter Gollmann ; Rudolf Schreiner
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng ; Chung-Huang Yang ; T.R.N. Rao
A Role-Based Model for Access Control in Database Federations / Eric Disson ; Danielle Boulanger ; Gilles Dubois
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li ; Lianli Chang ; Xinmei Wang
A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park ; Im-Yeong Lee
Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi ; Tae Ho Cho
Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland
Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu
SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park ; Jang-Se Lee ; Hwan Kuk Kim ; Jeong-Rye Jeong ; Dong-Bok Yeom ; Sung-Do Chi
A New Semantics of Authentication Logic / Yifa Li
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park ; Sook Ee Jeong ; Chang Soo Kim
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Human-Computer Interaction I
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri
Computer-Based Trust
Trusted Ticket Systems and Applications / Andreas U. Schmidt ; Nicolai Kuntze
Trust Evaluation for Web Applications based on Behavioral Analysis / Luiz da Costa Carmo ; Breno de Oliveira ; Augusto Braga
Information Security Management I
Improving the Information Security Model by using TFI / Rose-Mharie Ahlfeldt ; Paolo Spagnoletti ; Guttorm Sindre
Ontological Mapping of Common Criteria's Security Assurance Requirements / Andreas Ekelhart ; Stefan Fenz ; Gernot Goluch ; Edgar Weippl
Network Security I
Management of Exceptions on Access Control Policies / Joaquin Garcia-Alfaro ; Frederic Cuppens ; Nora Cuppens-Boulahia
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols / Tieyan Li ; Guilin Wang
Information Security Management II
Exploratory Survey on an Evaluation Model for a Sense of Security / Natsuko Hikage ; Yuko Murayama ; Carl Hauser
Employees' Adherence to Information Security Policies: An Empirical Study / Mikko Siponen ; Seppo Pahnila ; Adam Mahmood
Network Security II
Phishing in the Wireless: Implementation and Analysis / Ivan Martinovic ; Frank Zdarsky ; Adam Bachorek ; Christian Jung ; Jens Schmitt
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks / Tyler Moore ; Jolyon Clulow
Access Control I
A Credential-Based System for the Anonymous Delegation of Rights / Liesje Demuynck ; Bart De Decker ; Wouter Joosen
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content / Christian Josef Eibl ; S.H. Basie von Solms ; Sigrid Schubert
Human-Computer Interaction II
Identity Theft - Empirical Evidence from a Phishing Exercise / Tjaart Steyn ; Hennie Kruger ; Lynette Drevin
A Practical Usability Evaluation of Security Features in End-User Applications / Steven Furnell ; Dimitris Katsabas ; Paul Dowland ; Fraser Reid
Intrusion Detection Systems
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis / Maciej Rossudowski ; Hein Venter ; Jan Eloff
A Survey of Bots Used for Distributed Denial of Service Attacks / Vrizlynn Thing ; Morris Sloman ; Naranker Dulay
Access Control II
A Hybrid PKI-IBC Based Ephemerizer System / Srijith Nair ; Mohammad Dashti ; Bruno Crispo ; Andrew Tanenbaum
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices / Sevasti Karatzouni ; Nathan Clarke
Information Privacy I
Security Remarks on a Convertible Nominative Signature Scheme / Feng Bao
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions / Alapan Arnab ; Andrew Hutchison
Access Control III
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation / Evangelos Kotsovinos ; Ingo Friese ; Martin Kurze ; Jorg Heuer
Extending Role Based Access Control Model for Distributed Multidomain Applications / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Information Privacy II
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy / Claudio Ardagna ; Marco Cremonini ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Pierangela Samarati
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning / Jan Zibuschka ; Lothar Fritsch ; Mike Radmacher ; Tobias Scherner ; Kai Rannenberg
Access Control IV
Crafting Web Counters into Covert Channels / Xiapu Luo ; Edmond Chan ; Rocky Chang
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM / Thierry Sans
Security Services
Non-Repudiation in Internet Telephony / Andreas Schmidt ; Christian Hett
FirePatch: Secure and Time-Critical Dissemination of Software Patches / Havard Johansen ; Dag Johansen ; Robbert van Renesse
Access Control V
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing / Sara Foresti ; Sushil Jajodia ; Stefano Paraboschi
Building a Distributed Semantic-aware Security Architecture / Jan Kolter ; Rolf Schillinger ; Gunther Pernul
Trust and Intrusion Detection Systems
Using Trust to Resist Censorship in the Presence of Collusion / Andriy Panchenko ; Lexi Pimenidis
Evaluating the Effects of Model Generalization on Intrusion Detection Performance / Zhuowei Li ; Amitabha Das ; Jianying Zhou
Keynote paper
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM / William Caelli
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
Covert Identity Information in Direct Anonymous Attestation (DAA) / Carsten Rudolph
Safeguarding Personal Data using Rights Management in Distributed Applications / Adolf Hohl ; Alf Zugenmaier
Identification Now and in the Future: Social Grant Distribution Process in South Africa / Stephen Flowerday ; Gideon Ranga
Hard-drive Disposal and Identity Fraud / Paula Thomas ; Theodore Tryfonas
An analysis of security and privacy issues relating to RFID enabled ePassports / Eleni Kosta ; Martin Meints ; Marit Hansen ; Mark Gasson
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework / Nicholas Tate ; Sharman Lichtenstein ; Matthew Warren
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program / Tatjana Welzer ; Marko Holbl ; Ana Habjanic ; Bostjan Brumen ; Marjan Druzovec
Remote Virtual Information Assurance Network / Ronald Dodge ; Corey Bertram ; Daniel Ragsdale
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model / Kara Nance ; Brian Hay
Author Index
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures / Jan Camenisch ; Dieter Sommer ; Roger Zimmermann
Security in Mobile and Ad Hoc Networks
Authenticated Query Flooding in Sensor Networks / Zinaida Benenson ; Felix C. Freiling ; Ernest Hammerschmidt ; Stefan Lucks ; Lexi Pimenidis
Identity Based Message Authentication for Dynamic Networks / Pietro Michiardi ; Refik Molva
Providing Authentication and Access Control in Vehicular Network Environment / Hasnaa Moustafa ; Gilles Bourdon ; Yvon Gourhant
Trust and Security Management
A Framework for Web Services Trust / Marijke Coetzee ; Jan Eloff
Trust: An Element of Security / Stephen Flowerday ; Rossouw von Solms
Security-by-Ontology: A Knowledge-Centric Approach / Bill Tsoumas ; Panagiotis Papagiannakopoulos ; Stelios Dritsas ; Dimitris Gritzalis
Privacy Enhancing Technologies II
A Methodology for Designing Controlled Anonymous Applications / Vincent Naessens ; Bart De Decker
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities / Sandra Steinbrecher
Protecting (Anonymous) Credentials with the Trusted Computing Group's Trusted Platform Modules V1.2
Attacks, Vulnerability Analysis, and Tools
Analysis and Improvement of Anti-Phishing Schemes / Dinei Florêncio ; Cormac Herley
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks / Kameswari Kotapati ; Peng Liu ; Thomas F. LaPorta
Protecting Web Services from DOS Attacks by SOAP Message Validation / Nils Gruschka ; Norbert Luttenberger
Access Control and Authentication I
A Flexible and Distributed Architecture to Enforce Dynamic Access Control / Thierry Sans ; Frédéric Cuppens ; Nora Cuppens-Boulahia
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications / Andreas Mattas ; Ioannins Mavridis ; Iason Pagkalos
CAS++: An Open Source Single Sign-on Solution for Secure E-services / Claudio Agostino Ardagna ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Fulvio Frati ; Pierangela Samarati
Security Protocols
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps / Jianying Zhou ; Jose A. Onieva ; Javier Lopez
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol / Michael Backes ; Birgit Pfitzmann
Sealed-Bid Micro Auctions / Kun Peng ; Colin Boyd ; Ed Dawson
Intrusion Detection
Detecting Known and Novel Network Intrusions / Yacine Bouzida
Evaluating Classifiers for Mobile-Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Mika Raento
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts / Xiaoxin Yin ; William Yurcik ; Adam Slagell
Usability and Awareness
A Usability Study of Security Policy Management / Almut Herzog ; Nahid Shahmehri
Considering the Usability of End-User Security Software / Steven Furnell ; Adila Jusoh ; Dimitris Katsabas ; Paul Dowland
Utilizing the Common Criteria for Advanced Student Research Projects / Thuy D. Nguyen ; Cynthia E. Irvine
Privacy Enhancing Technologies III
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems / Rafael Accorsi
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications / Huafei Zhu ; Tieyan Li ; Feng Bao
Access Control and Authentication II
Click Passwords / Darko Kirovski ; Nebojsa Jojic ; Paul Roberts
Cryptographically Enforced Personalized Role-Based Access Control / Milan Petkovic ; Claudine Conrado ; Malik Hammoutene
Access Control and Authentication III
Using VO Concept for Managing Dynamic Security Associations / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets / Martin Gilje Jaatun ; Inger Anne Tondel ; Frederic Paint ; Tor Hjalmar Johannessen ; John Charles Francis ; Claire Duranton
Forensics
Network Forensics on Packet Fingerprints / Chia Yuan Cho ; Sin Yeung Lee ; Chung Pheng Tan ; Yong Tai Tan
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages / Martin Karresand
IFIP WG 11.1/11.8 Security Culture Workshop
Organizational Security Culture: More Than Just an End-User Phenomenon / Anthonie B. Ruighaver ; Sean B. Maynard
Cyber Security Training and Awareness Through Game Play / Benjamin D. Cone ; Michael F. Thompson
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge / Omar Zakaria
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security / Jabiri Kuwe Bakari ; Charles N. Tarimo ; Christer Magnusson ; Louise Yngström
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment / Lynette Drevin ; Hennie Kruger ; Tjaart Steyn
Using Phishing for User Email Security Awareness / Ronald C. Dodge ; Aaron J. Ferguson
IFIP WG 11.4 I-NetSec'06 Workshop
Invited Talk: Anonymous Credentials: Opportunities and Challenges
ACM Workshop on XML Security ; Association for Computing Machinery ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; ACM Conference on Computer and Communications Security
出版情報:
New York, N.Y. : Association for Computing Machinery, c2004 vi, 121 p. ; 28 cm
ACM Symposium on Information, Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報:
New York, NY : Associations for Computing Machinery, c2006 i, [12], 347 p. ; 28 cm
ACM Workshop on Digital Identity Management ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報:
New York, N.Y. : Association for Computing Machinery, c2006 vi, 114 p. ; 28 cm
ACM Workshop on Quality of Protection ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報:
New York, NY : Association for Computing Machinery, c2006 60 p. ; 28 cm
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie
Privacy and Anonymity
Low Latency Anonymity with Mix Rings / Matthew Burnside ; Angelos D. Keromytis
Breaking Four Mix-Related Schemes Based on Universal Re-encryption / George Danezis
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy / Maurizio Atzori
Protecting Data Privacy Through Hard-to-Reverse Negative Databases / Fernando Esponda ; Elena S. Ackley ; Paul Helman ; Haixia Jia ; Stephanie Forrest
Block Ciphers and Hash Functions
Related-Key Rectangle Attack on 42-Round SHACAL-2 / Jiqiang Lu ; Jongsung Kim ; Nathan Keller ; Orr Dunkelman
On the Collision Resistance of RIPEMD-160 / Florian Mendel ; Norbert Pramstaller ; Christian Rechberger ; Vincent Rijmen
Digital Signatures
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption / Javier Herranz ; Fabien Laguillaumie
A Security Architecture for Protecting LAN Interactions / Andre Zuquete ; Hugo Marques
Simulation of Internet DDoS Attacks and Defense / Igor Kotenko ; Alexander Ulanov
Snooze: Toward a Stateful NetwOrk prOtocol fuzZEr / Greg Banks ; Marco Cova ; Viktoria Felmetsger ; Kevin Almeroth ; Richard Kemmerer
Watermarking and DRM
Rights Protection for Data Cubes / Jie Guo ; Yingjiu Li ; Robert H. Deng ; Kefei Chen
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) / Huifang Yin ; Jun Li
Intrusion Detection and Worms
Resistance Analysis to Intruders' Evasion of Detecting Intrusion / Jianhua Yang ; Yongzhong Zhang ; Shou-Hsuan Stephen Huang
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks / Luciano Bononi ; Carlo Tacconi
Anomaly Intrusion Detection Based on Clustering a Data Stream / Sang-Hyun Oh ; Jin-Suk Kang ; Yung-Cheol Byun ; Taikyeong T. Jeong ; Won-Suk Lee
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation / K. Anagnostakis ; S. Ioannidis ; A.D. Keromytis ; M.B. Greenwald
Key Exchange
An Authentication and Key Exchange Protocol for Secure Credential Services / SeongHan Shin ; Kazukuni Kobara ; Hideki Imai
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders / Yvo Desmedt ; Josef Pieprzyk ; Ron Steinfeld ; Huaxiong Wang
Security Protocols and Formal Methods
Formalising Receipt-Freeness / H.L. Jonker ; E.P. de Vink
Enhancing the Security and Efficiency of 3-D Secure / Mohammed Assora ; Ayoub Shirvani
Designing and Verifying Core Protocols for Location Privacy / David von Oheimb ; Jorge Cuellar
Information Systems Security
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches / Mila Katzarova ; Andrew Simpson
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness / Jose M Torres ; Jose M Sarriegi ; Javier Santos ; Nicolas Serrano
Author Index
Software Security
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie