Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 5312 : Security and Cryptology

ISBN: 3540895973, 9783540895978

Size: 4 MB (4254959 bytes)

Pages: 299/308

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Maciej Grześkowiak (auth.), Kanta Matsuura, Eiichiro Fujisaki (eds.)3540895973, 9783540895978

This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008.

The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on cryptography, signature and signcryption, software security, privacy protection and contents protection, authentication and access control, as well as implementation.


Table of contents :
Front Matter….Pages –
On Generating Elements of Orders Dividing p 2k ± p k  + 1….Pages 1-19
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure….Pages 20-33
Remarks on the Attack of Fouque et al. against the ℓIC Scheme….Pages 34-48
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles….Pages 49-63
Signcryption Scheme in Multi-user Setting without Random Oracles….Pages 64-82
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices….Pages 83-99
The Superdiversifier: Peephole Individualization for Software Protection….Pages 100-120
Detecting Java Theft Based on Static API Trace Birthmark….Pages 121-135
Online Network Forensics for Automatic Repair Validation….Pages 136-151
Return Value Predictability Profiles for Self–healing….Pages 152-166
Involuntary Information Leakage in Social Network Services….Pages 167-183
Privacy Preserving Computations without Public Key Cryptographic Operation….Pages 184-200
A Novel Framework for Watermarking: The Data-Abstracted Approach….Pages 201-217
The Elliptic Curve Discrete Logarithm Problem: State of the Art….Pages 218-218
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication….Pages 219-230
Analysis of a Biometric Authentication Protocol for Signature Creation Application….Pages 231-245
Efficient Secure Labeling Method under Dynamic XML Data Streams….Pages 246-260
Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems….Pages 261-278
The Long-Short-Key Primitive and Its Applications to Key Security….Pages 279-297
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings”
Shopping Cart
Scroll to Top