Information and communications security [electronic resource] : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings / Peng Ning, Sihan Qing, Ninghui Li (eds.)
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , , |
Other title: | ICICS 2006. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2006.
|
Series: | Lecture notes in computer science ;
4307. |
Subjects: |
Table of Contents:
- Security protocols
- Strong and robust RFID authentication enabling perfect ownership transfer / Chae Hoon Lim, Taekyoung Kwon
- A robust and secure RFID-based pedigree system / Chiu C. Tan, Qun Li
- A topological condition for solving fair exchange in Byzantine environments / Benoît Garbinato, Ian Rickebush
- A security analysis of the precise time protocol / Jeanette Tsang, Konstantin Beznosov
- Applied cryptography
- An identity-based proxy signature scheme from pairings / Kyung-Ah Shim
- Finding compact reliable broadcast in unknown fixed-identity networks / Huafei Zhu, Jianying Zhou
- Formal analysis and systematic construction of two-factor authentication scheme / Guomin Yang [and others]
- Hierarchical key assignment for black-box tracing with efficient ciphertext size / Tatsuyuki Matsushita, Hideki Imai
- Trace-driven cache attacks on AES / Onur Aciicmez, C̜etin Kaya Koc̜
- Access control and systems security
- A construction for general and efficient oblivious commitment based envelope protocols / Jiangtao Li, Ninghui Li
- Defining and measuring policy coverage in testing access control policies / Evan Martin, Tao Xie, Ting Yu
- Distributed credential chain discovery in trust management with parameterized roles and constraints / Ziqing Mao, Ninghaui Li, William H. Winsborough
- An operating system design for the security architecture for microprocessors / Jörg Platte, Raúl Durán Díaz, Edwin Naroska.
- Privacy and malicious code
- Point-based trust : define how much privacy is worth / Danfeng Yao [and others]
- Efficient protocols for privacy preserving matching against distributed datasets / Yingpeng Sang [and others]
- Quantifying information leakage in tree-based hash protocols / Karsten Nohl, David Evans
- An anonymous authentication scheme for identification card / He Ge
- A wireless covert channel on smart cards / Geir Olav Dyrkolbotn, Einar Snekkenes
- Network security
- From proxy encryption primitives to a deployable secure-mailing-list solution / Himanshu Khurana, Jin Heo, Meenal Pant
- Mathematical foundations for the design of a low-rise DoS attack to iterative servers / Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro García-Teodoro
- An independent function-parallel firewall architecture for high-speed networks / Errin W. Fulp
- Estimating accuracy of mobile-masquerader detection using worst-case and best-case scenario / Oleksiy Mazhelis, Seppo Puuronen, Mika Raento
- An enhanced N-way exchange-based incentive scheme for P2P file sharing / Lingli Deng [and others]
- Systems security
- Provably correct runtime enforcement of non-interference properties / V.N. Venkatakrishnan [and others]
- An attack on SMC-based software protection / Yongdong Wu, Zhigang Zhao, Tian Wei Chui
- Modular behavior profiles in systems with shared libraries / Carla Marceau, Matt Stillerman
- Efficient protection against heap-based buffer overflows without resoting to magic / Yves Younan, Wouter Joosen, Frank Piessens.
- Cryptanalysis
- Cryptanalysis of timestamp-based password authentication schemes using smart cards / Guilin Wang, Feng Bao
- Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings / Kyung-Ah Shim, Seung-Hyun Seo
- Seifert's RSA fault attack : simplified analysis and generalizations / James A. Muir
- The fairness of perfect concurrent signatures / Guilin Wang, Feng Bao, Jianying Zhou
- Applied cryptography and network security
- Secure set membership using 3SAT / Michael de Mare, Rebecca N. Wright
- Left-to-right signed-bit T-adic representations of n integers / Billy Bob Brumley
- Universal designated verifier signature without delegatability / Xinyi Huang [and others]
- Tracing HTTP activity through non-cooperating HTTP proxies / Roger J. Edell, Peter Kruus, Uri Meth
- Security implementations
- A fast RSA implementation on Itanium 2 processor / Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh
- Efficient implementation of public key cryptosystems on mote sensors / Haodong Wang, Qun Li
- Threshold implementations against side-channel attacks and glitches / Svetla Nikova, Christian Rechberger, Vincent Rijmen
- Hardware-and-software-based security architecture for broadband router / Xiazhuo Gu [and others]