Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr., chairs/editors ; sponsored ... by SPIE--The International Society for Optical Engineering ; cooperating organization, Colorado Photonics Industry Association (USA)
出版情報:
Bellingham, Wash., USA : SPIE, c2001 vii, 332 p. ; 28 cm
Chang Wen Chen, C.-C. Jay Kuo, Anthony Vetro, chairs/editors ; sponsored and published by SPIE--The International Society for Optical Engineering ; technical cosponsor IEICE Communications Society (Japan) in cooperation with IEICE Electronics Society (Japan)
出版情報:
Bellingham, Wash. : SPIE, c2004 viii, 330 p. ; 28 cm
Experimenting with Electronic Commerce on the PalmPilot / Neil Daswani ; Dan Boneh
Blinding of Credit Card Numbers in the SET Protocol / Hugo Krawczyk
Anonymity Control
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing / Ari Juels
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems / Tomas Sander ; Amnon Ta-Shma
Fraud Management
Risk Management for E-Cash Systems with Partial Real-Time Audit / Yacov Yacobi
Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash / Kazuo J. Ezawa ; Gregory Napiorkowski ; Mariusz Kossarski
Public-Key Certificates
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys / Reto Kohlas ; Ueli Maurer
Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance / Barbara Fox ; Brian LaMacchia
Steganography
Playing 'Hide and Seek' with Stored Keys / Adi Shamir ; Nicko van Someren
On Channel Capacity and Modulation of Watermarks in Digital Still Images / Markus Breitbach ; Hideki Imai
Content Distribution
Towards Making Broadcast Encryption Practical / Michel Abdalla ; Yuval Shavitt ; Avishai Wool
Conditional Access Concepts and Principles / David W. Kravitz ; David M. Goldschlag
Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary) / Jon Callas ; Joan Feigenbaum ; David Goldschlag ; Erin Sawyer
Anonymity Mechanisms
Anonymous Authentication of Membership in Dynamic Groups / Stuart Schechter ; Todd Parnell ; Alexander Hartemink
Some Open Issues and New Directions in Group Signatures / Giuseppe Ateniese ; Gene Tsudik
Auctions and Markets
Anonymous Investing: Hiding the Identities of Stockholders / Philip MacKenzie ; Jeffrey Sorensen
Fair On-Line Auctions without Special Trusted Parties / Stuart G. Stubblebine ; Paul F. Syverson
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control" / Yair Frankel ; Moti Yung
Improved Magic Ink Signatures Using Hints / Markus Jakobsson ; Joy Muller
Author Index
Electronic Commerce
Experimenting with Electronic Commerce on the PalmPilot / Neil Daswani ; Dan Boneh
Blinding of Credit Card Numbers in the SET Protocol / Hugo Krawczyk
Enhanced Correlation in an Intrusion Detection Process / S. Benferhat ; F. Autrel ; F. Cuppens
Safeguarding SCADA Systems with Anomaly Detection / J. Bigham ; D. Gamez ; N. Lu
Experiments with Simulation of Attacks against Computer Networks / I. Kotenko ; E. Man'kov
Detecting Malicious Codes by the Presence of Their "Gene of Self-replication" / V.A. Skormin ; D.H. Summerville ; J.S. Moronski
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences / K. Wee ; B. Moon
Public Key Distribution, Authentication, Access Control
Distributed Access Control: A Logic-Based Approach / S. Barker
Advanced Certificate Status Protocol / D.H. Yum ; J.E. Kang ; P.J. Lee
Key History Tree: Efficient Group Key Management with Off-Line Members / A. Lain ; V. Borisov
A Certificate Status Checking Protocol for the Authenticated Dictionary / J.L. Munoz ; J. Forne ; O. Esparza ; M. Soriano
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach / R. Wolf ; M. Schneider
Cryptography
A Signcryption Scheme Based on Secret Sharing Technique / M. Al-Ibrahim
A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem / P. Caballero-Gil ; C. Hernández-Goya
Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property / Y.D. Ko ; D.J. Hong ; S.H. Hong ; S.J. Lee ; J.L. Lim
Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper / V. Korzhik ; V. Yakovlev ; A. Sinuk
On Cipher Design Based on Switchable Controlled Operations / N.A. Moldovyan
Elliptic Curve Point Multiplication / A. Rostovtsev ; E. Makhovenko
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation / N. Sklavos ; A.A. Moldovyan ; O. Koufopavlou
Steganography
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel / V. Gorodetsky ; V. Samoilov
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation / K. Zhang ; S. Wang ; X. Zhang
Digital Watermarking under a Filtering and Additive Noise Attack Condition / V. Korzhik, G ; . Morales-Luna ; I. Marakova ; C. Patino-Ruvalcaba
Data Hiding in Digital Audio by Frequency Domain Dithering
Steganography with Least Histogram Abnormality
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences
Short Papers
Authentication of Anycast Communication / A. Cerny
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy / R. Ando ; Y. Takefuji
Construction of the Covert Channels / A. Grusho ; E. Timonina
Privacy and Data Protection in Electronic Communications / L. Mitrou ; K. Moulinos
Multiplier for Public-Key Cryptosystem Based on Cellular Automata / H.S. Kim ; S.H. Hwang
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols / S. Kumar ; V. Marbukh
Alert Triage on the ROC / F.J. Martin ; E. Plaza
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 / N.D. Goots ; B.V. Izotov
Immunocomputing Model of Intrusion Detection / Y. Melnikov ; A. Tarakanov
Agent Platform Security Architecture / G. Santana ; L.B. Sheremetov ; M. Contreras
Support Vector Machine Based ICMP Covert Channel Attack Detection / T. Sohn ; T. Noh ; J. Moon
Computer Immunology System with Variable Configuration / S.P. Sokolova ; R.S. Ivlev
Author Index
Invited Papers
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park
Private Selective Payment Protocols / Giovanni Di Crescenzo
Financial Cryptography Tools (I)
Sharing Decryption in the Context of Voting or Lotteries / Pierre-Alain Fouque ; Guillaume Poupard ; Jacques Stern
Electronic Postcards
Postal Revenue Collection in the Digital Age / Leon A. Pintsov ; Scott A. Vanstone
Signing on a Postcard / David Naccache
Panel (I)
Payment Systems: The Next Generation
Abuses of Systems
Non-repudiation in SET: Open Issues / Els Van Herreweghen
Statistics and Secret Leakage / Jean-Sebastien Coron ; Paul Kocher
Analysis of Abuse-Free Contract Signing / Vitaly Shmatikov ; John C. Mitchell
Asymmetric Currency Rounding / David M'Ra¿ihi ; Michael Tunstall
Financial Crypto Policies and Issues
The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel / Barak D. Jolish
Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers / Apol-lonia Martinez Nadal ; Josep Lluis Ferrer Gomila
A Response to "Can We Eliminate Certificate Revocation Lists?" / Patrick McDaniel ; Aviel Rubin
Anonymity
Self-Scrambling Anonymizers / David Pointcheval
Authentic Attributes with Fine-Grained Anonymity Protection / Stuart G. Stubblebine ; Paul F. Syverson
Resource-Efficient Anonymous Group Identification / Ben Handley
Financial Cryptography Tools (II)
Secret Key Authentication with Software-Only Verification / Jaap-Henk Hoepman
Panel (II)
Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? / Barbara Fox ; Brian LaMacchia
System Architectures
Financial Cryptography in 7 Layers / Ian Grigg
Capability-Based Financial Instruments / Mark S. Miller ; Chip Morningstar ; Bill Frantz
Author Index
Digital Rights Management
Efficient Trace and Revoke Schemes / Moni Naor ; Benny Pinkas
Efficient Watermark Detection and Collusion Security / Francis Zane
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Human-Computer Interaction I
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri
Computer-Based Trust
Trusted Ticket Systems and Applications / Andreas U. Schmidt ; Nicolai Kuntze
Trust Evaluation for Web Applications based on Behavioral Analysis / Luiz da Costa Carmo ; Breno de Oliveira ; Augusto Braga
Information Security Management I
Improving the Information Security Model by using TFI / Rose-Mharie Ahlfeldt ; Paolo Spagnoletti ; Guttorm Sindre
Ontological Mapping of Common Criteria's Security Assurance Requirements / Andreas Ekelhart ; Stefan Fenz ; Gernot Goluch ; Edgar Weippl
Network Security I
Management of Exceptions on Access Control Policies / Joaquin Garcia-Alfaro ; Frederic Cuppens ; Nora Cuppens-Boulahia
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols / Tieyan Li ; Guilin Wang
Information Security Management II
Exploratory Survey on an Evaluation Model for a Sense of Security / Natsuko Hikage ; Yuko Murayama ; Carl Hauser
Employees' Adherence to Information Security Policies: An Empirical Study / Mikko Siponen ; Seppo Pahnila ; Adam Mahmood
Network Security II
Phishing in the Wireless: Implementation and Analysis / Ivan Martinovic ; Frank Zdarsky ; Adam Bachorek ; Christian Jung ; Jens Schmitt
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks / Tyler Moore ; Jolyon Clulow
Access Control I
A Credential-Based System for the Anonymous Delegation of Rights / Liesje Demuynck ; Bart De Decker ; Wouter Joosen
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content / Christian Josef Eibl ; S.H. Basie von Solms ; Sigrid Schubert
Human-Computer Interaction II
Identity Theft - Empirical Evidence from a Phishing Exercise / Tjaart Steyn ; Hennie Kruger ; Lynette Drevin
A Practical Usability Evaluation of Security Features in End-User Applications / Steven Furnell ; Dimitris Katsabas ; Paul Dowland ; Fraser Reid
Intrusion Detection Systems
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis / Maciej Rossudowski ; Hein Venter ; Jan Eloff
A Survey of Bots Used for Distributed Denial of Service Attacks / Vrizlynn Thing ; Morris Sloman ; Naranker Dulay
Access Control II
A Hybrid PKI-IBC Based Ephemerizer System / Srijith Nair ; Mohammad Dashti ; Bruno Crispo ; Andrew Tanenbaum
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices / Sevasti Karatzouni ; Nathan Clarke
Information Privacy I
Security Remarks on a Convertible Nominative Signature Scheme / Feng Bao
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions / Alapan Arnab ; Andrew Hutchison
Access Control III
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation / Evangelos Kotsovinos ; Ingo Friese ; Martin Kurze ; Jorg Heuer
Extending Role Based Access Control Model for Distributed Multidomain Applications / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Information Privacy II
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy / Claudio Ardagna ; Marco Cremonini ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Pierangela Samarati
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning / Jan Zibuschka ; Lothar Fritsch ; Mike Radmacher ; Tobias Scherner ; Kai Rannenberg
Access Control IV
Crafting Web Counters into Covert Channels / Xiapu Luo ; Edmond Chan ; Rocky Chang
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM / Thierry Sans
Security Services
Non-Repudiation in Internet Telephony / Andreas Schmidt ; Christian Hett
FirePatch: Secure and Time-Critical Dissemination of Software Patches / Havard Johansen ; Dag Johansen ; Robbert van Renesse
Access Control V
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing / Sara Foresti ; Sushil Jajodia ; Stefano Paraboschi
Building a Distributed Semantic-aware Security Architecture / Jan Kolter ; Rolf Schillinger ; Gunther Pernul
Trust and Intrusion Detection Systems
Using Trust to Resist Censorship in the Presence of Collusion / Andriy Panchenko ; Lexi Pimenidis
Evaluating the Effects of Model Generalization on Intrusion Detection Performance / Zhuowei Li ; Amitabha Das ; Jianying Zhou
Keynote paper
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM / William Caelli
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
Covert Identity Information in Direct Anonymous Attestation (DAA) / Carsten Rudolph
Safeguarding Personal Data using Rights Management in Distributed Applications / Adolf Hohl ; Alf Zugenmaier
Identification Now and in the Future: Social Grant Distribution Process in South Africa / Stephen Flowerday ; Gideon Ranga
Hard-drive Disposal and Identity Fraud / Paula Thomas ; Theodore Tryfonas
An analysis of security and privacy issues relating to RFID enabled ePassports / Eleni Kosta ; Martin Meints ; Marit Hansen ; Mark Gasson
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework / Nicholas Tate ; Sharman Lichtenstein ; Matthew Warren
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program / Tatjana Welzer ; Marko Holbl ; Ana Habjanic ; Bostjan Brumen ; Marjan Druzovec
Remote Virtual Information Assurance Network / Ronald Dodge ; Corey Bertram ; Daniel Ragsdale
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model / Kara Nance ; Brian Hay
Author Index
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures / Jan Camenisch ; Dieter Sommer ; Roger Zimmermann
Security in Mobile and Ad Hoc Networks
Authenticated Query Flooding in Sensor Networks / Zinaida Benenson ; Felix C. Freiling ; Ernest Hammerschmidt ; Stefan Lucks ; Lexi Pimenidis
Identity Based Message Authentication for Dynamic Networks / Pietro Michiardi ; Refik Molva
Providing Authentication and Access Control in Vehicular Network Environment / Hasnaa Moustafa ; Gilles Bourdon ; Yvon Gourhant
Trust and Security Management
A Framework for Web Services Trust / Marijke Coetzee ; Jan Eloff
Trust: An Element of Security / Stephen Flowerday ; Rossouw von Solms
Security-by-Ontology: A Knowledge-Centric Approach / Bill Tsoumas ; Panagiotis Papagiannakopoulos ; Stelios Dritsas ; Dimitris Gritzalis
Privacy Enhancing Technologies II
A Methodology for Designing Controlled Anonymous Applications / Vincent Naessens ; Bart De Decker
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities / Sandra Steinbrecher
Protecting (Anonymous) Credentials with the Trusted Computing Group's Trusted Platform Modules V1.2
Attacks, Vulnerability Analysis, and Tools
Analysis and Improvement of Anti-Phishing Schemes / Dinei Florêncio ; Cormac Herley
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks / Kameswari Kotapati ; Peng Liu ; Thomas F. LaPorta
Protecting Web Services from DOS Attacks by SOAP Message Validation / Nils Gruschka ; Norbert Luttenberger
Access Control and Authentication I
A Flexible and Distributed Architecture to Enforce Dynamic Access Control / Thierry Sans ; Frédéric Cuppens ; Nora Cuppens-Boulahia
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications / Andreas Mattas ; Ioannins Mavridis ; Iason Pagkalos
CAS++: An Open Source Single Sign-on Solution for Secure E-services / Claudio Agostino Ardagna ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Fulvio Frati ; Pierangela Samarati
Security Protocols
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps / Jianying Zhou ; Jose A. Onieva ; Javier Lopez
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol / Michael Backes ; Birgit Pfitzmann
Sealed-Bid Micro Auctions / Kun Peng ; Colin Boyd ; Ed Dawson
Intrusion Detection
Detecting Known and Novel Network Intrusions / Yacine Bouzida
Evaluating Classifiers for Mobile-Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Mika Raento
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts / Xiaoxin Yin ; William Yurcik ; Adam Slagell
Usability and Awareness
A Usability Study of Security Policy Management / Almut Herzog ; Nahid Shahmehri
Considering the Usability of End-User Security Software / Steven Furnell ; Adila Jusoh ; Dimitris Katsabas ; Paul Dowland
Utilizing the Common Criteria for Advanced Student Research Projects / Thuy D. Nguyen ; Cynthia E. Irvine
Privacy Enhancing Technologies III
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems / Rafael Accorsi
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications / Huafei Zhu ; Tieyan Li ; Feng Bao
Access Control and Authentication II
Click Passwords / Darko Kirovski ; Nebojsa Jojic ; Paul Roberts
Cryptographically Enforced Personalized Role-Based Access Control / Milan Petkovic ; Claudine Conrado ; Malik Hammoutene
Access Control and Authentication III
Using VO Concept for Managing Dynamic Security Associations / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets / Martin Gilje Jaatun ; Inger Anne Tondel ; Frederic Paint ; Tor Hjalmar Johannessen ; John Charles Francis ; Claire Duranton
Forensics
Network Forensics on Packet Fingerprints / Chia Yuan Cho ; Sin Yeung Lee ; Chung Pheng Tan ; Yong Tai Tan
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages / Martin Karresand
IFIP WG 11.1/11.8 Security Culture Workshop
Organizational Security Culture: More Than Just an End-User Phenomenon / Anthonie B. Ruighaver ; Sean B. Maynard
Cyber Security Training and Awareness Through Game Play / Benjamin D. Cone ; Michael F. Thompson
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge / Omar Zakaria
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security / Jabiri Kuwe Bakari ; Charles N. Tarimo ; Christer Magnusson ; Louise Yngström
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment / Lynette Drevin ; Hennie Kruger ; Tjaart Steyn
Using Phishing for User Email Security Awareness / Ronald C. Dodge ; Aaron J. Ferguson
IFIP WG 11.4 I-NetSec'06 Workshop
Invited Talk: Anonymous Credentials: Opportunities and Challenges
ACM Workshop on Digital Identity Management ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報:
New York, N.Y. : Association for Computing Machinery, c2006 vi, 114 p. ; 28 cm
ACM Workshop on Recurring Malcode ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報:
New York, NY : Association for Computing Machinery, c2006 75 p. ; 28 cm
ACM SIGKDD International Workshop on Knowledge Discovery from Uncertain Data ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報:
New York, N.Y. : Association for Computing Machinery, c2009 61 p. ; 28 cm
ACM SIGKDD Workshop on Visual Analysis and Knowledge Discovery ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報:
New York, N.Y. : Association for Computing Machinery, c2009 92 p. ; 28 cm
ACM Workshop on Digital Identity Management ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報:
New York : Association for Computing Machinery, c2009 84 p. ; 28 cm
ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報:
New York, N.Y. : Association for Computing Machinery, c2009 ix, 90 p. ; 28 cm
Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr., chairs/editors ; sponsored and published by SPIE--the International Society for Optical Engineering
ACM Workshop on Digital Identity Management ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報:
New York : Association for Computing Machinery, c2008 100 p. ; 28 cm
sponsored by Association for Computing Machinery Special Interest Group on Security, Audit, and Control, with support from United States Department of Defense, University of Newcastle upon Tyne
出版情報:
New York : Association for Computing Machinery, c1998 vi, 116 p. ; 28 cm