close
1.

図書

図書
Viktor E. Hampel, Clifford Neuman, John P. Barlow, chairs/editors ; sponsored ... by SPIE--The International Society for Optical Engineering
出版情報: Bellingham, WA : SPIE, c1996  viii, 172 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 2616
所蔵情報: loading…
2.

図書

図書
Andrew G. Tescher ... [et al.], chairs/editors ; sponsored and published by SPIE--The International Society for Optical Engineering
出版情報: Bellingham, Washington : SPIE, c1999  ix, 622 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 3528
所蔵情報: loading…
3.

図書

図書
Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr., chairs/editors ; sponsored ... by SPIE--The International Society for Optical Engineering ; cooperating organization, Colorado Photonics Industry Association (USA)
出版情報: Bellingham, Wash., USA : SPIE, c2001  vii, 332 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 4518
所蔵情報: loading…
4.

図書

図書
Andrew G. Tescher, ... [et al.], chairs/editors ; sponsored and published by SPIE--The International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE, c2002  vii, 336 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 4861
所蔵情報: loading…
5.

図書

図書
Andrew G. Tescher ... [et al.], chairs/editors ; sponsored and published by SPIE--The International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE, c2003  vii, 244 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 5241
所蔵情報: loading…
6.

図書

図書
Chang Wen Chen, C.-C. Jay Kuo, Anthony Vetro, chairs/editors ; sponsored and published by SPIE--The International Society for Optical Engineering ; technical cosponsor IEICE Communications Society (Japan) in cooperation with IEICE Electronics Society (Japan)
出版情報: Bellingham, Wash. : SPIE, c2004  viii, 330 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 5600
所蔵情報: loading…
7.

図書

図書
Anthony Vetro ... [et al.], chairs/editors ; sponsored and published by SPIE--the International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE, c2005  1 v. (various pagings) ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 6015
所蔵情報: loading…
8.

図書

図書
Susanto Rahardja, ... [et al.], chairs/editors ; sponsored and published by SPIE--the International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE, c2006  1 v. (various pagings) ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; 6391
所蔵情報: loading…
9.

図書

図書
Matthew Franklin (ed.)
出版情報: Berlin ; Tokyo : Springer, c1999  viii, 267 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1648
所蔵情報: loading…
目次情報: 続きを見る
Electronic Commerce
Experimenting with Electronic Commerce on the PalmPilot / Neil Daswani ; Dan Boneh
Blinding of Credit Card Numbers in the SET Protocol / Hugo Krawczyk
Anonymity Control
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing / Ari Juels
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems / Tomas Sander ; Amnon Ta-Shma
Fraud Management
Risk Management for E-Cash Systems with Partial Real-Time Audit / Yacov Yacobi
Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash / Kazuo J. Ezawa ; Gregory Napiorkowski ; Mariusz Kossarski
Public-Key Certificates
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys / Reto Kohlas ; Ueli Maurer
Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance / Barbara Fox ; Brian LaMacchia
Steganography
Playing 'Hide and Seek' with Stored Keys / Adi Shamir ; Nicko van Someren
On Channel Capacity and Modulation of Watermarks in Digital Still Images / Markus Breitbach ; Hideki Imai
Content Distribution
Towards Making Broadcast Encryption Practical / Michel Abdalla ; Yuval Shavitt ; Avishai Wool
Conditional Access Concepts and Principles / David W. Kravitz ; David M. Goldschlag
Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary) / Jon Callas ; Joan Feigenbaum ; David Goldschlag ; Erin Sawyer
Anonymity Mechanisms
Anonymous Authentication of Membership in Dynamic Groups / Stuart Schechter ; Todd Parnell ; Alexander Hartemink
Some Open Issues and New Directions in Group Signatures / Giuseppe Ateniese ; Gene Tsudik
Auctions and Markets
Anonymous Investing: Hiding the Identities of Stockholders / Philip MacKenzie ; Jeffrey Sorensen
Fair On-Line Auctions without Special Trusted Parties / Stuart G. Stubblebine ; Paul F. Syverson
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control" / Yair Frankel ; Moti Yung
Improved Magic Ink Signatures Using Hints / Markus Jakobsson ; Joy Muller
Author Index
Electronic Commerce
Experimenting with Electronic Commerce on the PalmPilot / Neil Daswani ; Dan Boneh
Blinding of Credit Card Numbers in the SET Protocol / Hugo Krawczyk
10.

図書

図書
edited by Louise Yngström, Jan Carlsen
出版情報: London ; Tokyo : Chapman & Hall on behalf of the IFIP, 1997  vii, 468 p. ; 24 cm
所蔵情報: loading…
11.

図書

図書
edited by Jan H. P. Eloff and Sebastiaan H. von Solms
出版情報: London ; Tokyo : Chapman & Hall on behalf of the IFIP, 1995  viii, 623 p. ; 24 cm
所蔵情報: loading…
12.

図書

図書
Rebecca N. Wright (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 320 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2742
所蔵情報: loading…
13.

図書

図書
Roger Dingledine, Paul Syverson (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2482
所蔵情報: loading…
14.

図書

図書
Roger Dingledine (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 221 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2760
所蔵情報: loading…
目次情報: 続きを見る
Mix-Networks with Restricted Routes / George Danezis
Generalising Mixes / Claudia D'iaz ; Andrei Serjantov
Modelling Unlinkability / Sandra Steinbrecher ; Stefan Kopsell
Metrics for Traffic Analysis Prevention / Richard E. Newman ; Ira S. Moskowitz ; Paul Syverson
Breaking and Mending Resilient Mix-Nets / Lan Nguyen ; Rei Safavi-Naini
Improving Onion Notation / Richard Clayton
Engineering Privacy in Public: Confounding Face Recognition / James Alexander ; Jonathan Smith
From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions / Andrew S. Patrick ; Steve Kenny
Thwarting Web Censorship with Untrusted Messenger Discovery / Nick Feamster ; Magdalena Balazinska ; Winston Wang ; Hari Balakrishnan ; David Karger
gap - Practical Anonymous Networking / Krista Bennett ; Christian Grothoff
An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks / Dennis Kügler
A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-Based Systems / Alfred Kobsa
Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon / Birgit Pfitzmann
From P3P to Data Licenses / Shi-Cho Cha ; Yuh-Jzer Joung
Author Index
Mix-Networks with Restricted Routes / George Danezis
Generalising Mixes / Claudia D'iaz ; Andrei Serjantov
Modelling Unlinkability / Sandra Steinbrecher ; Stefan Kopsell
15.

図書

図書
Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xiv, 470 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2776
所蔵情報: loading…
目次情報: 続きを見る
Invited Papers
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL / T. Kosiyatrakul ; S. Older ; P. Humenn ; S.-K. Chin
Complexity Problems in the Analysis of Information Systems Security / A. Slissenko
A Behavior-Based Approach to Securing Email Systems / S.J. Stolfo ; S. Hershkop ; K. Wang ; O. Nimeskern ; C.-W. Hu
Real-Time Intrusion Detection with Emphasis on Insider Attacks / S. Upadhyaya
Mathematical Models and Architectures for Computer Network Security
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols / S. Bistarelli ; I. Cervesato ; G. Lenzini ; F. Martinelli
GRID Security Review / L. Gymnopoulos ; S. Dritsas ; S. Gritzalis ; C. Lambrinoudakis
A Knowledge-Based Repository Model for Security Policies Management / S. Kokolakis ; D. Gritzalis
Symbolic Partial Model Checking for Security Analysis
Rule-Based Systems Security Model / M. Smirnov
Logical Resolving for Security Evaluation / P.D. Zegzhda ; D.P. Zegzhda ; M.O. Kalinin
Intrusion Detection
Enhanced Correlation in an Intrusion Detection Process / S. Benferhat ; F. Autrel ; F. Cuppens
Safeguarding SCADA Systems with Anomaly Detection / J. Bigham ; D. Gamez ; N. Lu
Experiments with Simulation of Attacks against Computer Networks / I. Kotenko ; E. Man'kov
Detecting Malicious Codes by the Presence of Their "Gene of Self-replication" / V.A. Skormin ; D.H. Summerville ; J.S. Moronski
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences / K. Wee ; B. Moon
Public Key Distribution, Authentication, Access Control
Distributed Access Control: A Logic-Based Approach / S. Barker
Advanced Certificate Status Protocol / D.H. Yum ; J.E. Kang ; P.J. Lee
Key History Tree: Efficient Group Key Management with Off-Line Members / A. Lain ; V. Borisov
A Certificate Status Checking Protocol for the Authenticated Dictionary / J.L. Munoz ; J. Forne ; O. Esparza ; M. Soriano
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach / R. Wolf ; M. Schneider
Cryptography
A Signcryption Scheme Based on Secret Sharing Technique / M. Al-Ibrahim
A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem / P. Caballero-Gil ; C. Hernández-Goya
Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property / Y.D. Ko ; D.J. Hong ; S.H. Hong ; S.J. Lee ; J.L. Lim
Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper / V. Korzhik ; V. Yakovlev ; A. Sinuk
On Cipher Design Based on Switchable Controlled Operations / N.A. Moldovyan
Elliptic Curve Point Multiplication / A. Rostovtsev ; E. Makhovenko
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation / N. Sklavos ; A.A. Moldovyan ; O. Koufopavlou
Steganography
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel / V. Gorodetsky ; V. Samoilov
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation / K. Zhang ; S. Wang ; X. Zhang
Digital Watermarking under a Filtering and Additive Noise Attack Condition / V. Korzhik, G ; . Morales-Luna ; I. Marakova ; C. Patino-Ruvalcaba
Data Hiding in Digital Audio by Frequency Domain Dithering
Steganography with Least Histogram Abnormality
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences
Short Papers
Authentication of Anycast Communication / A. Cerny
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy / R. Ando ; Y. Takefuji
Construction of the Covert Channels / A. Grusho ; E. Timonina
Privacy and Data Protection in Electronic Communications / L. Mitrou ; K. Moulinos
Multiplier for Public-Key Cryptosystem Based on Cellular Automata / H.S. Kim ; S.H. Hwang
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols / S. Kumar ; V. Marbukh
Alert Triage on the ROC / F.J. Martin ; E. Plaza
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 / N.D. Goots ; B.V. Izotov
Immunocomputing Model of Intrusion Detection / Y. Melnikov ; A. Tarakanov
Agent Platform Security Architecture / G. Santana ; L.B. Sheremetov ; M. Contreras
Support Vector Machine Based ICMP Covert Channel Attack Detection / T. Sohn ; T. Noh ; J. Moon
Computer Immunology System with Variable Configuration / S.P. Sokolova ; R.S. Ivlev
Author Index
Invited Papers
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park
16.

図書

図書
Antonio Lioy, Daniele Mazzocchi (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 263 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2828
所蔵情報: loading…
目次情報: 続きを見る
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection
Network Security
Securing the Border Gateway Protocol: A Status Update / Stephen T. Kent
Towards an IPv6-Based Security Framework for Distributed Storage Resources / Alessandro Bassi ; Julien Laganier
Operational Characteristics of an Automated Intrusion Response System / Maria Papadaki ; Steven Furnell ; Benn Lines ; Paul Reynolds
Mobile and Wireless Network Security
A Secure Multimedia System in Emerging Wireless Home Networks / Nut Taesombut ; Richard Huang ; Venkat P. Rangan
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents / Yusuke Sakabe ; Masakazu Soshi ; Atsuko Miyaji
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems / Michelle S. Wangham ; Joni da Silva Fraga ; Rafael R. Obelheiro
Trust and Privacy
Privacy and Trust in Distributed Networks / Thomas Rossler ; Arno Hollosi
Extending the SDSI / SPKI Model through Federation Webs / Altair Olivo Santin ; Carlos Maziero
Trust-X: An XML Framework for Trust Negotiations / Elisa Bertino ; Elena Ferrari ; Anna C. Squicciarini
Application Security
How to Specify Security Services: A Practical Approach / Javier Lopez ; Juan J. Ortega ; Jose Vivas ; Jose M. Troya
Application Level Smart Card Support through Networked Mobile Devices / Pierpaolo Baglietto ; Francesco Moggia ; Nicola Zingirian ; Massimo Maresca
Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage / Kuan W. Yip
Multimedia Security
Selective Encryption of the JPEG2000 Bitstream / Roland Norcen ; Andreas Uhl
Robust Spatial Data Hiding for Color Images / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
Watermark Security via Secret Wavelet Packet Subband Structures / Werner Dietl
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression / David Megias ; Jordi Herrera-Joancomarti ; Julià Minguillón
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs / G.S. Poh
Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization / Bubi G. Flepp-Stars ; Herbert Stogner
Author Index
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
17.

図書

図書
edited by Ralf Steinmetz, Jana Dittman, Martin Steinebach
出版情報: Boston : Kluwer Academic Publishers, c2001  x, 393, [34] p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 64
所蔵情報: loading…
目次情報: 続きを見る
Preface
Conference Committees
Web Security
What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification / K. Scheibelhofer
XML Electronic Signatures / G. Karlinger
An integrated secure Web architecture for protected Mobile code distribution / M. Jalali-Sohi, et al.
Secure and anonymous multicast framework / N. Weiler ; B. Plattner
Vulnerabilities and Security Limitations of current IP Telephony Systems / R. Ackermann, et al. Watermarking I
Quantization Watermarking in the JPEG2000 Coding Pipeline / P. Meerwald
Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences / S. Tsekeridou, et al.
Scalable Detection of Perceptual Watermarks in JPEG2000 Images / D. Simitopoulos, et al.
Cryptographic Algorithms
Collecting randomness from the net / B. Bencsath ; I. Vajda
Encryption System Based on Neutral Network / C.-K. Chan, et al.
A Modified Chaotic Cryptographic Method / W. Wong, et al.
An Elliptic Curve Random Number Generator / I. Lee ; K. Wong
Watermarking II
Conditional and User Specific Access to Services and Resources Using Annotation Watermarks / J. Dittmann, et al.
Large Scale distributed watermarking of multicast media through encryption / R. Parviainen ; P. Parnes
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept / S. Craver ; S. Katzenbeisser
Fingerprints for Copyright Protection / S. Encheva
System Security
Software Security Assessment through Specification Mutations and Fault Injection / R. Kaksonen, et al.
Asynchronous Large-Scale Certification Based on Certificate Verification Trees / J. Domingo-Ferrer, et al.
ACLA: A Framework for Access Control List (ACL) Analysis and Optimization / J. Qian, et al.
Transparent Access to Encrypted Data Using Operating System Network Stack Extensions / E. Rademer ; S.D. Wolthusen
A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System / M. Markovic, et al.
Watermarking III
Optimization of Watermarking Performances Using Error Correcting Codes and Repetition / S. Zinger, et al.
Using Raw Speech as a Watermark, does it work? / P. Nintanavongsa ; T. Amornraksa
Multiple Security Aspects
Transferability in Coin Systems with Observers / C. Fremdt ; H. Neumann
Secure iLearning / F. Graf
Tree-based Multicast Key Agreement / J. Schwenk, et al.
Security for the core network of third generation mobile systems / G. Horn, et al.
Secure Internet Phone / P. Horster, et al.
Posters
Secure Meeting Scheduling with AgenTa / T. Herlea, et al.
Virtual Hidden Network / N. Shin
Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval / R. Puertpan, et al.
A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks / A. Eskicioglu
Secure Service Centered Networking for Nomadic Usage / M. Hollick
Last Minute Papers
A Secure Authentication Infrastructure for Mobile Communication Services over the Internet / I. Dupre la Tour, et al.
Blind Compressed-Domain Watermarking for MPEG-encoded Videos / C.-L. Wu, et al.
Index of Contributors
Preface
Conference Committees
Web Security
18.

図書

図書
Yair Frankel (ed.)
出版情報: Berlin ; Tokyo : Springer, c2001  xi, 378 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1962
所蔵情報: loading…
目次情報: 続きを見る
Digital Rights Management
Efficient Trace and Revoke Schemes / Moni Naor ; Benny Pinkas
Efficient Watermark Detection and Collusion Security / Francis Zane
Invited Lecture (I)
Towards More Sensible Anti-circumvention Regulations / Pamela Samuelson
Payment Systems
Self-Escrowed Cash against User Blackmailing / Birgit Pfitzmann ; Ahmad-Reza Sadeghi
Blind, Auditable Membership Proofs / Tomas Sander ; Amnon Ta-Shma ; Moti Yung
Private Selective Payment Protocols / Giovanni Di Crescenzo
Financial Cryptography Tools (I)
Sharing Decryption in the Context of Voting or Lotteries / Pierre-Alain Fouque ; Guillaume Poupard ; Jacques Stern
Electronic Postcards
Postal Revenue Collection in the Digital Age / Leon A. Pintsov ; Scott A. Vanstone
Signing on a Postcard / David Naccache
Panel (I)
Payment Systems: The Next Generation
Abuses of Systems
Non-repudiation in SET: Open Issues / Els Van Herreweghen
Statistics and Secret Leakage / Jean-Sebastien Coron ; Paul Kocher
Analysis of Abuse-Free Contract Signing / Vitaly Shmatikov ; John C. Mitchell
Asymmetric Currency Rounding / David M'Ra¿ihi ; Michael Tunstall
Financial Crypto Policies and Issues
The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel / Barak D. Jolish
Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers / Apol-lonia Martinez Nadal ; Josep Lluis Ferrer Gomila
A Response to "Can We Eliminate Certificate Revocation Lists?" / Patrick McDaniel ; Aviel Rubin
Anonymity
Self-Scrambling Anonymizers / David Pointcheval
Authentic Attributes with Fine-Grained Anonymity Protection / Stuart G. Stubblebine ; Paul F. Syverson
Resource-Efficient Anonymous Group Identification / Ben Handley
Financial Cryptography Tools (II)
Secret Key Authentication with Software-Only Verification / Jaap-Henk Hoepman
Panel (II)
Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? / Barbara Fox ; Brian LaMacchia
System Architectures
Financial Cryptography in 7 Layers / Ian Grigg
Capability-Based Financial Instruments / Mark S. Miller ; Chip Morningstar ; Bill Frantz
Author Index
Digital Rights Management
Efficient Trace and Revoke Schemes / Moni Naor ; Benny Pinkas
Efficient Watermark Detection and Collusion Security / Francis Zane
19.

図書

図書
edited by Hein Venter ... [et al.]
出版情報: New York : Springer, c2007  xv, 498 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 232
所蔵情報: loading…
目次情報: 続きを見る
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
Human-Computer Interaction I
Value creation and Return on Security Investments (ROSI) / Christer Magnusson ; Josef Molvidsson ; Sven Zetterqvist
Usability and Security of Personal Firewalls / Almut Herzog ; Nahid Shahmehri
Computer-Based Trust
Trusted Ticket Systems and Applications / Andreas U. Schmidt ; Nicolai Kuntze
Trust Evaluation for Web Applications based on Behavioral Analysis / Luiz da Costa Carmo ; Breno de Oliveira ; Augusto Braga
Information Security Management I
Improving the Information Security Model by using TFI / Rose-Mharie Ahlfeldt ; Paolo Spagnoletti ; Guttorm Sindre
Ontological Mapping of Common Criteria's Security Assurance Requirements / Andreas Ekelhart ; Stefan Fenz ; Gernot Goluch ; Edgar Weippl
Network Security I
Management of Exceptions on Access Control Policies / Joaquin Garcia-Alfaro ; Frederic Cuppens ; Nora Cuppens-Boulahia
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols / Tieyan Li ; Guilin Wang
Information Security Management II
Exploratory Survey on an Evaluation Model for a Sense of Security / Natsuko Hikage ; Yuko Murayama ; Carl Hauser
Employees' Adherence to Information Security Policies: An Empirical Study / Mikko Siponen ; Seppo Pahnila ; Adam Mahmood
Network Security II
Phishing in the Wireless: Implementation and Analysis / Ivan Martinovic ; Frank Zdarsky ; Adam Bachorek ; Christian Jung ; Jens Schmitt
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks / Tyler Moore ; Jolyon Clulow
Access Control I
A Credential-Based System for the Anonymous Delegation of Rights / Liesje Demuynck ; Bart De Decker ; Wouter Joosen
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content / Christian Josef Eibl ; S.H. Basie von Solms ; Sigrid Schubert
Human-Computer Interaction II
Identity Theft - Empirical Evidence from a Phishing Exercise / Tjaart Steyn ; Hennie Kruger ; Lynette Drevin
A Practical Usability Evaluation of Security Features in End-User Applications / Steven Furnell ; Dimitris Katsabas ; Paul Dowland ; Fraser Reid
Intrusion Detection Systems
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis / Maciej Rossudowski ; Hein Venter ; Jan Eloff
A Survey of Bots Used for Distributed Denial of Service Attacks / Vrizlynn Thing ; Morris Sloman ; Naranker Dulay
Access Control II
A Hybrid PKI-IBC Based Ephemerizer System / Srijith Nair ; Mohammad Dashti ; Bruno Crispo ; Andrew Tanenbaum
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices / Sevasti Karatzouni ; Nathan Clarke
Information Privacy I
Security Remarks on a Convertible Nominative Signature Scheme / Feng Bao
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions / Alapan Arnab ; Andrew Hutchison
Access Control III
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation / Evangelos Kotsovinos ; Ingo Friese ; Martin Kurze ; Jorg Heuer
Extending Role Based Access Control Model for Distributed Multidomain Applications / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Information Privacy II
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy / Claudio Ardagna ; Marco Cremonini ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Pierangela Samarati
Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning / Jan Zibuschka ; Lothar Fritsch ; Mike Radmacher ; Tobias Scherner ; Kai Rannenberg
Access Control IV
Crafting Web Counters into Covert Channels / Xiapu Luo ; Edmond Chan ; Rocky Chang
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM / Thierry Sans
Security Services
Non-Repudiation in Internet Telephony / Andreas Schmidt ; Christian Hett
FirePatch: Secure and Time-Critical Dissemination of Software Patches / Havard Johansen ; Dag Johansen ; Robbert van Renesse
Access Control V
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing / Sara Foresti ; Sushil Jajodia ; Stefano Paraboschi
Building a Distributed Semantic-aware Security Architecture / Jan Kolter ; Rolf Schillinger ; Gunther Pernul
Trust and Intrusion Detection Systems
Using Trust to Resist Censorship in the Presence of Collusion / Andriy Panchenko ; Lexi Pimenidis
Evaluating the Effects of Model Generalization on Intrusion Detection Performance / Zhuowei Li ; Amitabha Das ; Jianying Zhou
Keynote paper
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM / William Caelli
IFIP WG 9.6/11.7 - IT Misuse and the Law & the NoE "Future of Identity in the Information Society" (FIDIS) - Workshop on Security and Control of Identity in Society
Covert Identity Information in Direct Anonymous Attestation (DAA) / Carsten Rudolph
Safeguarding Personal Data using Rights Management in Distributed Applications / Adolf Hohl ; Alf Zugenmaier
Identification Now and in the Future: Social Grant Distribution Process in South Africa / Stephen Flowerday ; Gideon Ranga
Hard-drive Disposal and Identity Fraud / Paula Thomas ; Theodore Tryfonas
An analysis of security and privacy issues relating to RFID enabled ePassports / Eleni Kosta ; Martin Meints ; Marit Hansen ; Mark Gasson
IFIP WG 11.1/11.8 Workshop on Fostering Knowledge and Skills for Manageable Information Security
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework / Nicholas Tate ; Sharman Lichtenstein ; Matthew Warren
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program / Tatjana Welzer ; Marko Holbl ; Ana Habjanic ; Bostjan Brumen ; Marjan Druzovec
Remote Virtual Information Assurance Network / Ronald Dodge ; Corey Bertram ; Daniel Ragsdale
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model / Kara Nance ; Brian Hay
Author Index
Digital Forensics
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints / John Haggerty ; Mark Taylor
Digital Forensic Readiness as a Component of Information Security Best Practice / Talania Grobler ; Buks Louwrens
20.

図書

図書
edited by Simone Fischer-Hübner ... [et al.]
出版情報: New York : Springer, c2006  xvi, 494 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 201
所蔵情報: loading…
目次情報: 続きを見る
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures / Jan Camenisch ; Dieter Sommer ; Roger Zimmermann
Security in Mobile and Ad Hoc Networks
Authenticated Query Flooding in Sensor Networks / Zinaida Benenson ; Felix C. Freiling ; Ernest Hammerschmidt ; Stefan Lucks ; Lexi Pimenidis
Identity Based Message Authentication for Dynamic Networks / Pietro Michiardi ; Refik Molva
Providing Authentication and Access Control in Vehicular Network Environment / Hasnaa Moustafa ; Gilles Bourdon ; Yvon Gourhant
Trust and Security Management
A Framework for Web Services Trust / Marijke Coetzee ; Jan Eloff
Trust: An Element of Security / Stephen Flowerday ; Rossouw von Solms
Security-by-Ontology: A Knowledge-Centric Approach / Bill Tsoumas ; Panagiotis Papagiannakopoulos ; Stelios Dritsas ; Dimitris Gritzalis
Privacy Enhancing Technologies II
A Methodology for Designing Controlled Anonymous Applications / Vincent Naessens ; Bart De Decker
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities / Sandra Steinbrecher
Protecting (Anonymous) Credentials with the Trusted Computing Group's Trusted Platform Modules V1.2
Attacks, Vulnerability Analysis, and Tools
Analysis and Improvement of Anti-Phishing Schemes / Dinei Florêncio ; Cormac Herley
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks / Kameswari Kotapati ; Peng Liu ; Thomas F. LaPorta
Protecting Web Services from DOS Attacks by SOAP Message Validation / Nils Gruschka ; Norbert Luttenberger
Access Control and Authentication I
A Flexible and Distributed Architecture to Enforce Dynamic Access Control / Thierry Sans ; Frédéric Cuppens ; Nora Cuppens-Boulahia
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications / Andreas Mattas ; Ioannins Mavridis ; Iason Pagkalos
CAS++: An Open Source Single Sign-on Solution for Secure E-services / Claudio Agostino Ardagna ; Ernesto Damiani ; Sabrina De Capitani di Vimercati ; Fulvio Frati ; Pierangela Samarati
Security Protocols
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps / Jianying Zhou ; Jose A. Onieva ; Javier Lopez
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol / Michael Backes ; Birgit Pfitzmann
Sealed-Bid Micro Auctions / Kun Peng ; Colin Boyd ; Ed Dawson
Intrusion Detection
Detecting Known and Novel Network Intrusions / Yacine Bouzida
Evaluating Classifiers for Mobile-Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Mika Raento
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts / Xiaoxin Yin ; William Yurcik ; Adam Slagell
Usability and Awareness
A Usability Study of Security Policy Management / Almut Herzog ; Nahid Shahmehri
Considering the Usability of End-User Security Software / Steven Furnell ; Adila Jusoh ; Dimitris Katsabas ; Paul Dowland
Utilizing the Common Criteria for Advanced Student Research Projects / Thuy D. Nguyen ; Cynthia E. Irvine
Privacy Enhancing Technologies III
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems / Rafael Accorsi
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications / Huafei Zhu ; Tieyan Li ; Feng Bao
Access Control and Authentication II
Click Passwords / Darko Kirovski ; Nebojsa Jojic ; Paul Roberts
Cryptographically Enforced Personalized Role-Based Access Control / Milan Petkovic ; Claudine Conrado ; Malik Hammoutene
Access Control and Authentication III
Using VO Concept for Managing Dynamic Security Associations / Yuri Demchenko ; Leon Gommans ; Cees de Laat
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets / Martin Gilje Jaatun ; Inger Anne Tondel ; Frederic Paint ; Tor Hjalmar Johannessen ; John Charles Francis ; Claire Duranton
Forensics
Network Forensics on Packet Fingerprints / Chia Yuan Cho ; Sin Yeung Lee ; Chung Pheng Tan ; Yong Tai Tan
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages / Martin Karresand
IFIP WG 11.1/11.8 Security Culture Workshop
Organizational Security Culture: More Than Just an End-User Phenomenon / Anthonie B. Ruighaver ; Sean B. Maynard
Cyber Security Training and Awareness Through Game Play / Benjamin D. Cone ; Michael F. Thompson
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge / Omar Zakaria
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security / Jabiri Kuwe Bakari ; Charles N. Tarimo ; Christer Magnusson ; Louise Yngström
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment / Lynette Drevin ; Hennie Kruger ; Tjaart Steyn
Using Phishing for User Email Security Awareness / Ronald C. Dodge ; Aaron J. Ferguson
IFIP WG 11.4 I-NetSec'06 Workshop
Invited Talk: Anonymous Credentials: Opportunities and Challenges
Practical Private Regular Expression Matching / Florian Kerschbaum
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments / Siani Pearson ; Marco Casassa-Mont
The APROB-Channel: Adaptive Semi-Real-Time Anonymous Communication / Gergely Tóth ; Zoltán Hornák
Author Index
Privacy and Privacy-Enhancing Technologies I
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy / Inger Anne Tøndel
Ensuring Privacy for Buyer-Seller E-Commerce / George Yee ; Larry Korba ; Ronggong Song
21.

図書

図書
edited by Jaynarayan H. Lala ; [supported by] DARPA
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  xix, 435 p. ; 28 cm
所蔵情報: loading…
22.

図書

図書
[sponsored by the IEEE Systems, Man and Cybernetics Society ; co chairs: Don Welch, Jack Marin]
出版情報: Piscataway, N.J. : IEEE, c2003  [vii], 307 p. ; 28 cm
所蔵情報: loading…
23.

図書

図書
edited by Dominique Gaïti
出版情報: New York : Springer, c2006  vi, 236 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 213
所蔵情報: loading…
24.

図書

図書
Giovanni Di Crescenzo, Avi Rubin (eds.)
出版情報: Berlin : Springer, c2006  xi, 325 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4107
所蔵情報: loading…
25.

図書

図書
Ernesto Damiani & Hiroshi Maruyama, editors ; sponsored by ACM Special Interest Group on Security, Audit & Control (SIGSAC)
出版情報: New York, N.Y. : ACM Press, c2005  vi, 91 p. ; 28 cm
所蔵情報: loading…
26.

図書

図書
ACM Workshop on Secure Web Services ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York, N.Y. : Association for Computing Machinery, c2006  110 p. ; 28 cm
所蔵情報: loading…
27.

図書

図書
ACM Workshop on Digital Identity Management ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York, N.Y. : Association for Computing Machinery, c2006  vi, 114 p. ; 28 cm
所蔵情報: loading…
28.

図書

図書
ACM Workshop on Recurring Malcode ; ACM Conference on Computer and Communications Security ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York, NY : Association for Computing Machinery, c2006  75 p. ; 28 cm
所蔵情報: loading…
29.

図書

図書
ACM Workshop on Scalable Trusted Computing ; ACM Conference on Computer and Communications Security
出版情報: New York, NY : Association for Computing Machinery, c2006  56 p. ; 28 cm
所蔵情報: loading…
30.

図書

図書
George Danezis, Philippe Golle (eds.)
出版情報: Berlin : Springer, 2006  viii, 429 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4258
所蔵情報: loading…
31.

図書

図書
Roland Büschkes, Pavel Laskov (eds.)
出版情報: Berlin : Springer, c2006  x, 194 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4064
所蔵情報: loading…
32.

図書

図書
David Martin, Andrei Serjantov (eds.)
出版情報: Berlin ; Tokyo : Springer, c2005  viii, 343 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3424
所蔵情報: loading…
33.

図書

図書
Klaus Julisch, Christopher Kruegel (eds.)
出版情報: Berlin : Springer, c2005  x, 240 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3548
所蔵情報: loading…
34.

図書

図書
edited by David Chadwick, Bart Preneel
出版情報: New York : Springer, 2005  xii, 287 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 175
所蔵情報: loading…
35.

図書

図書
Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.)
出版情報: Berlin : Springer, c2005  xiv, 480 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3685
所蔵情報: loading…
36.

図書

図書
edited by Dominique Gaïti, Sebastià Galmés, Ramon Puigjaner
出版情報: New York : Springer, c2005  xiv, 348 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 165
所蔵情報: loading…
37.

図書

図書
David Chadwick, Gansen Zhao (eds.)
出版情報: Berlin : Springer, c2005  xi, 270 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3545
所蔵情報: loading…
38.

図書

図書
edited by Dominique Gaïti ...[et al.]
出版情報: Boston : Kluwer Academic Publishers, c2003  vii, 273 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 133
所蔵情報: loading…
39.

図書

図書
ACM SIGKDD International Workshop on Knowledge Discovery from Uncertain Data ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  61 p. ; 28 cm
所蔵情報: loading…
40.

図書

図書
Workshop on Social Network Mining and Analysis ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  87 p. ; 28 cm
所蔵情報: loading…
41.

図書

図書
ACM SIGKDD Workshop on Visual Analysis and Knowledge Discovery ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  92 p. ; 28 cm
所蔵情報: loading…
42.

図書

図書
ACM Workshop on Secure Web Services ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York : Association for Computing Machinery, c2009  58 p. ; 28 cm
所蔵情報: loading…
43.

図書

図書
Programming Languages and Analysis for Security Workshop ; ACM Special Interest Group in Programming Languages
出版情報: New York, NY : Association for Computing Machinery, c2009  131 p. ; 28 cm
所蔵情報: loading…
44.

図書

図書
ACM Workshop on Scalable Trusted Computing ; ACM Conference on Computer and Communications Security
出版情報: New York, NY : Association for Computing Machinery, c2009  72 p. ; 28 cm
所蔵情報: loading…
45.

図書

図書
ACM Workshop on Digital Identity Management ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York : Association for Computing Machinery, c2009  84 p. ; 28 cm
所蔵情報: loading…
46.

図書

図書
Cloud Computing Security Workshop ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York : Association for Computing Machinery, c2009  134 p. ; 28 cm
所蔵情報: loading…
47.

図書

図書
ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics ; Association for Computing Machinery. Special Interest Group on Knowledge Discovery & Data Mining
出版情報: New York, N.Y. : Association for Computing Machinery, c2009  ix, 90 p. ; 28 cm
所蔵情報: loading…
48.

図書

図書
edited by Ryoichi Sasaki ... [et al.]
出版情報: New York : Springer, 2005  xvi, 612 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 181
所蔵情報: loading…
目次情報: 続きを見る
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
Internet and Web Security
Mobility and Ubiquitous Security
Secure Commercial Systems
Trusted Computing Systems
Accountable Anonymous E-Mail
Protecting Consumer Data in Composite Web Services
Enhancing Security in ERP Systems
Architecture for User Authentication and Key Exchange
A Secure Quantum Communication Protocol Using Insecure Public Channels
Mathematical Models of IP Traceback Methods
Secure Human Communications Based on Biometrics Signals
Designated-Verifier Proxy Signature Schemes
Signcryption in Hierarchical Identity Based Cryptosystem
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
49.

図書

図書
Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr., chairs/editors ; sponsored and published by SPIE--the International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE, c1999-  v. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 3845, 4209
所蔵情報: loading…
50.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York, NY : Association for Computing Machinery, c2007  75 p. ; 28 cm
所蔵情報: loading…
51.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York, N.Y. : Association for Computing Machinery, c2007  vi, 121 p. ; 28 cm
所蔵情報: loading…
52.

図書

図書
sponsored by ACM SIGSAC
出版情報: New York, N.Y. : Association for Computing Machinery, c2007  vi, 92 p. ; 28 cm
所蔵情報: loading…
53.

図書

図書
ACM Workshop on Scalable Trusted Computing ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York : Association for Computing Machinery, c2008  91 p. ; 28 cm
所蔵情報: loading…
54.

図書

図書
ACM Workshop on Digital Identity Management ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; Association for Computing Machinery
出版情報: New York : Association for Computing Machinery, c2008  100 p. ; 28 cm
所蔵情報: loading…
55.

図書

図書
ACM Workshop on Secure Web Services ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control
出版情報: New York : Association for Computing Machinery, c2008  101 p. ; 28 cm
所蔵情報: loading…
56.

図書

図書
Susanto Rahardja, JongWon Kim, Jiebo Luo, editors ; sponsored by SPIE
出版情報: Bellingham, Wash. : SPIE, c2007  1 v. (various pagings) ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 6777
所蔵情報: loading…
57.

図書

図書
sponsored by Association for Computing Machinery Special Interest Group on Security, Audit, and Control, with support from United States Department of Defense, University of Newcastle upon Tyne
出版情報: New York : Association for Computing Machinery, c1998  vi, 116 p. ; 28 cm
所蔵情報: loading…
58.

図書

図書
sponsored by Association for Computing Machinery Special Interest Group on Security, Audit, and Control
出版情報: New York : Association for Computing Machinery, c1999  ix, 142 p. ; 28 cm
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼