Satoshi Hada, Kouichi Sakurai (auth.), Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (eds.)3540756507, 9783540756507
Table of contents :
Front Matter….Pages –
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption….Pages 1-12
Design Issues of an Isolated Sandbox Used to Analyze Malwares….Pages 13-27
Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique….Pages 28-43
Reduction Optimal Trinomials for Efficient Software Implementation of the η T Pairing….Pages 44-57
Experiments on the Linear Algebra Step in the Number Field Sieve….Pages 58-73
Batch Pairing Delegation….Pages 74-90
Botnet Traffic Detection Techniques by C&C Session Classification Using SVM….Pages 91-104
A Global Authentication Scheme for Mobile Ad-Hoc Networks….Pages 105-120
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks….Pages 121-136
Intrusion Detection and Identification System Using Data Mining and Forensic Techniques….Pages 137-152
Run-Time Randomization to Mitigate Tampering….Pages 153-168
Privacy-Preserving Eigentaste-Based Collaborative Filtering….Pages 169-184
Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks….Pages 185-198
Verifiable Internet Voting Solving Secure Platform Problem….Pages 199-213
Enforcement of Integrated Security Policy in Trusted Operating Systems….Pages 214-229
Salvia : A Privacy-Aware Operating System for Prevention of Data Leakage….Pages 230-245
InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs….Pages 246-261
Accredited Symmetrically Private Information Retrieval….Pages 262-277
Generic Certificateless Encryption in the Standard Model….Pages 278-291
On Security Models and Compilers for Group Key Exchange Protocols….Pages 292-307
Processing Multi-parameter Attacktrees with Estimated Parameter Values….Pages 308-319
Practical Security Analysis of E-Voting Systems….Pages 320-335
Fine-Grained Sticky Provenance Architecture for Office Documents….Pages 336-351
Secure Anonymous Communications with Practical Anonymity Revocation Scheme….Pages 352-364
GAS: Overloading a File Sharing Network as an Anonymizing System….Pages 365-379
A Composite Privacy Protection Model….Pages 380-395
Nominative Signature from Ring Signature….Pages 396-411
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications….Pages 412-427
How to Find Many Collisions of 3-Pass HAVAL….Pages 428-443
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol….Pages 444-458
Back Matter….Pages –
Reviews
There are no reviews yet.