Information and communications security [electronic resource] : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings / Peng Ning, Sihan Qing, Ninghui Li (eds.)

Saved in:
Bibliographic Details
Corporate Author: ICICS (Conference) Raleigh, N.C.)
Other Authors: Ning, Peng, Qing, Sihan, Li, Ninghui (Computer scientist)
Other title:ICICS 2006.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2006.
Series:Lecture notes in computer science ; 4307.
Subjects:
Table of Contents:
  • Security protocols
  • Strong and robust RFID authentication enabling perfect ownership transfer / Chae Hoon Lim, Taekyoung Kwon
  • A robust and secure RFID-based pedigree system / Chiu C. Tan, Qun Li
  • A topological condition for solving fair exchange in Byzantine environments / Benoît Garbinato, Ian Rickebush
  • A security analysis of the precise time protocol / Jeanette Tsang, Konstantin Beznosov
  • Applied cryptography
  • An identity-based proxy signature scheme from pairings / Kyung-Ah Shim
  • Finding compact reliable broadcast in unknown fixed-identity networks / Huafei Zhu, Jianying Zhou
  • Formal analysis and systematic construction of two-factor authentication scheme / Guomin Yang [and others]
  • Hierarchical key assignment for black-box tracing with efficient ciphertext size / Tatsuyuki Matsushita, Hideki Imai
  • Trace-driven cache attacks on AES / Onur Aciicmez, C̜etin Kaya Koc̜
  • Access control and systems security
  • A construction for general and efficient oblivious commitment based envelope protocols / Jiangtao Li, Ninghui Li
  • Defining and measuring policy coverage in testing access control policies / Evan Martin, Tao Xie, Ting Yu
  • Distributed credential chain discovery in trust management with parameterized roles and constraints / Ziqing Mao, Ninghaui Li, William H. Winsborough
  • An operating system design for the security architecture for microprocessors / Jörg Platte, Raúl Durán Díaz, Edwin Naroska.
  • Privacy and malicious code
  • Point-based trust : define how much privacy is worth / Danfeng Yao [and others]
  • Efficient protocols for privacy preserving matching against distributed datasets / Yingpeng Sang [and others]
  • Quantifying information leakage in tree-based hash protocols / Karsten Nohl, David Evans
  • An anonymous authentication scheme for identification card / He Ge
  • A wireless covert channel on smart cards / Geir Olav Dyrkolbotn, Einar Snekkenes
  • Network security
  • From proxy encryption primitives to a deployable secure-mailing-list solution / Himanshu Khurana, Jin Heo, Meenal Pant
  • Mathematical foundations for the design of a low-rise DoS attack to iterative servers / Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro García-Teodoro
  • An independent function-parallel firewall architecture for high-speed networks / Errin W. Fulp
  • Estimating accuracy of mobile-masquerader detection using worst-case and best-case scenario / Oleksiy Mazhelis, Seppo Puuronen, Mika Raento
  • An enhanced N-way exchange-based incentive scheme for P2P file sharing / Lingli Deng [and others]
  • Systems security
  • Provably correct runtime enforcement of non-interference properties / V.N. Venkatakrishnan [and others]
  • An attack on SMC-based software protection / Yongdong Wu, Zhigang Zhao, Tian Wei Chui
  • Modular behavior profiles in systems with shared libraries / Carla Marceau, Matt Stillerman
  • Efficient protection against heap-based buffer overflows without resoting to magic / Yves Younan, Wouter Joosen, Frank Piessens.
  • Cryptanalysis
  • Cryptanalysis of timestamp-based password authentication schemes using smart cards / Guilin Wang, Feng Bao
  • Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings / Kyung-Ah Shim, Seung-Hyun Seo
  • Seifert's RSA fault attack : simplified analysis and generalizations / James A. Muir
  • The fairness of perfect concurrent signatures / Guilin Wang, Feng Bao, Jianying Zhou
  • Applied cryptography and network security
  • Secure set membership using 3SAT / Michael de Mare, Rebecca N. Wright
  • Left-to-right signed-bit T-adic representations of n integers / Billy Bob Brumley
  • Universal designated verifier signature without delegatability / Xinyi Huang [and others]
  • Tracing HTTP activity through non-cooperating HTTP proxies / Roger J. Edell, Peter Kruus, Uri Meth
  • Security implementations
  • A fast RSA implementation on Itanium 2 processor / Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh
  • Efficient implementation of public key cryptosystems on mote sensors / Haodong Wang, Qun Li
  • Threshold implementations against side-channel attacks and glitches / Svetla Nikova, Christian Rechberger, Vincent Rijmen
  • Hardware-and-software-based security architecture for broadband router / Xiazhuo Gu [and others]