Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong (auth.), Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shinichi Kawamura (eds.)3540476997, 9783540476993
Table of contents :
Front Matter….Pages –
ID-Based Ring Signature Scheme Secure in the Standard Model….Pages 1-16
A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability….Pages 17-32
Sound Computational Interpretation of Symbolic Hashes in the Standard Model….Pages 33-47
A Requirement Centric Framework for Information Security Evaluation….Pages 48-59
A Model-Based Method for Security Configuration Verification….Pages 60-75
Personal Computer Privacy: Analysis for Korean PC Users….Pages 76-87
Short Traceable Signatures Based on Bilinear Pairings….Pages 88-103
Ring Signature with Designated Linkability….Pages 104-119
Ad Hoc Group Signatures….Pages 120-135
Rateless Codes for the Multicast Stream Authentication Problem….Pages 136-151
Crossing Borders: Security and Privacy Issues of the European e-Passport….Pages 152-167
A New Approach to Hide Policy for Automated Trust Negotiation….Pages 168-178
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing….Pages 179-195
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures….Pages 196-211
A Study of Detection Method of Printed Image Alteration Using Digital Watermark….Pages 212-226
Real-Time Watermark Embedding for High Resolution Video Watermarking….Pages 227-238
Inhibiting Card Sharing Attacks….Pages 239-251
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction….Pages 252-267
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks….Pages 268-277
Modeling of Network Intrusions Based on the Multiple Transition Probability….Pages 278-291
Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition….Pages 292-307
Ciphertext-Auditable Public Key Encryption….Pages 308-321
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model….Pages 322-336
On the Effectiveness of TMTO and Exhaustive Search Attacks….Pages 337-352
Low Power AES Hardware Architecture for Radio Frequency Identification….Pages 353-363
The High-Speed Packet Cipher System Suitable for Small Sized Data….Pages 364-377
A Tool for Managing Security Policies in Organisations….Pages 378-388
Information Flow Query and Verification for Security Policy of Security-Enhanced Linux….Pages 389-404
The Complexity of Discretionary Access Control….Pages 405-420
Traceroute Based IP Channel for Sending Hidden Short Messages….Pages 421-436
Back Matter….Pages –
Reviews
There are no reviews yet.