Advances in Information and Computer Security: Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4752 : Security and Cryptology

ISBN: 3540756507, 9783540756507

Size: 6 MB (6203511 bytes)

Pages: 462/471

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Satoshi Hada, Kouichi Sakurai (auth.), Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (eds.)3540756507, 9783540756507

The International Workshop on Security (IWSEC 2007) was the second in the annualseriesthat startedin 2006.IWSEC 2007washeld at the New Public Hall in Nara, Japan, during October 29–31, 2007. This year there were 112 paper submissions, and from these 30 papers were accepted. Accepted papers came from 27 di?erent countries, with the largest proportion coming from Japan (12). Estonia, China, Korea, Spain, Taiwan and the USA contributed 2 papers each and Canada, Germany, Greece, Poland, Turkeyand Vietnam contributed 1 paper each. We would liketo thank all of the authors who submitted papers to IWSEC 2007. The contributed papers were supplemented by one invited talk from the – inent researcher Prof. Doug Tygar (UC Berkeley) in information security. We were fortunate to have an energetic team of experts who formed the Program Committee. Their names may be found overleaf, and we are sincerely grateful for all their great e?orts. This team was supported by an even larger number of individuals who reviewedpapers in their particularareasof expertise. A list of these names is also provided; we hope it is complete.

Table of contents :
Front Matter….Pages –
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption….Pages 1-12
Design Issues of an Isolated Sandbox Used to Analyze Malwares….Pages 13-27
Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique….Pages 28-43
Reduction Optimal Trinomials for Efficient Software Implementation of the η T Pairing….Pages 44-57
Experiments on the Linear Algebra Step in the Number Field Sieve….Pages 58-73
Batch Pairing Delegation….Pages 74-90
Botnet Traffic Detection Techniques by C&C Session Classification Using SVM….Pages 91-104
A Global Authentication Scheme for Mobile Ad-Hoc Networks….Pages 105-120
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks….Pages 121-136
Intrusion Detection and Identification System Using Data Mining and Forensic Techniques….Pages 137-152
Run-Time Randomization to Mitigate Tampering….Pages 153-168
Privacy-Preserving Eigentaste-Based Collaborative Filtering….Pages 169-184
Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks….Pages 185-198
Verifiable Internet Voting Solving Secure Platform Problem….Pages 199-213
Enforcement of Integrated Security Policy in Trusted Operating Systems….Pages 214-229
Salvia : A Privacy-Aware Operating System for Prevention of Data Leakage….Pages 230-245
InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs….Pages 246-261
Accredited Symmetrically Private Information Retrieval….Pages 262-277
Generic Certificateless Encryption in the Standard Model….Pages 278-291
On Security Models and Compilers for Group Key Exchange Protocols….Pages 292-307
Processing Multi-parameter Attacktrees with Estimated Parameter Values….Pages 308-319
Practical Security Analysis of E-Voting Systems….Pages 320-335
Fine-Grained Sticky Provenance Architecture for Office Documents….Pages 336-351
Secure Anonymous Communications with Practical Anonymity Revocation Scheme….Pages 352-364
GAS: Overloading a File Sharing Network as an Anonymizing System….Pages 365-379
A Composite Privacy Protection Model….Pages 380-395
Nominative Signature from Ring Signature….Pages 396-411
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications….Pages 412-427
How to Find Many Collisions of 3-Pass HAVAL….Pages 428-443
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol….Pages 444-458
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Advances in Information and Computer Security: Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings”
Shopping Cart
Scroll to Top