Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie (auth.), Jae Kwang Lee, Okyeon Yi, Moti Yung (eds.)3540710922, 9783540710929
The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical sections on public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, mobile security, DRM, information hiding, ubiquitous computing security, P2P security, pre-authentication for fast handoff in wireless mesh networks including mobile APs.
Table of contents :
Front Matter….Pages –
Controllable Ring Signatures….Pages 1-14
Efficient User Authentication and Key Agreement in Wireless Sensor Networks….Pages 15-29
Identity-Based Key Issuing Without Secure Channel in a Broad Area….Pages 30-44
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution….Pages 45-59
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks….Pages 60-73
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment….Pages 74-82
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm….Pages 83-99
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords….Pages 100-109
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification….Pages 110-120
Quality Assurance for Evidence Collection in Network Forensics….Pages 121-132
Visualization of Permission Checks in Java Using Static Analysis….Pages 133-146
Deployment of Virtual Machines in Lock-Keeper….Pages 147-159
Investigations of Power Analysis Attacks and Countermeasures for ARIA….Pages 160-172
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols….Pages 173-186
A Novel Key Agreement Scheme in a Multiple Server Environment….Pages 187-197
Cost-Effective IDS Operating Scheme in MANETs….Pages 198-210
Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6….Pages 211-224
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones….Pages 225-236
Distributed Management of OMA DRM Domains….Pages 237-251
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting….Pages 252-266
A Key Management Based on Multiple Regression in Hierarchical Sensor Network….Pages 267-281
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks….Pages 282-296
Privacy Protection in PKIs: A Separation-of-Authority Approach….Pages 297-311
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise….Pages 312-323
Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature….Pages 324-338
Secret Handshake with Multiple Groups….Pages 339-348
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs….Pages 349-363
EAP Using the Split Password-Based Authenticated Key Agreement….Pages 364-380
How Many Malicious Scanners Are in the Internet?….Pages 381-390
E-Passport: The Global Traceability Or How to Feel Like a UPS Package….Pages 391-404
Back Matter….Pages –
Reviews
There are no reviews yet.