×

Information security. 8th international conference, ISC 2005, Singapore, September 20–23, 2005. Proceedings. (English) Zbl 1087.68008

Lecture Notes in Computer Science 3650. Berlin: Springer (ISBN 3-540-29001-X/pbk). xii, 516 p. (2005).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1056.68020).
Indexed articles:
Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D., A dynamic mechanism for recovering from buffer overflow attacks, 1-15 [Zbl 1127.68397]
Onut, Iosif-Viorel; Zhu, Bin; Ghorbani, Ali A., SVision: a network host-centered anomaly visualization technique, 16-28 [Zbl 1127.68394]
Nali, Deholo; Adams, Carlisle; Miri, Ali, Time-based release of confidential information in hierarchical settings, 29-43 [Zbl 1127.68393]
Konstantinou, Elisavet; Liagkou, Vasiliki; Spirakis, Paul; Stamatiou, Yannis C.; Yung, Moti, “Trust engineering”: from requirements to system design and maintenance – a working national lottery system experience, 44-58 [Zbl 1127.68385]
Yang, Yanjiang; Ooi, Beng Chin, A privacy preserving rental system, 59-73 [Zbl 1127.68400]
Dutta, Ratna; Barua, Rana, Constant round dynamic group key agreement, 74-88 [Zbl 1127.68376]
Chakrabarti, Dibyendu; Maitra, Subhamoy; Roy, Bimal, A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design, 89-103 [Zbl 1127.68374]
Lee, Hyung Mok; Ha, Kyung Ju; Ku, Kyo Min, ID-based multi-party authenticated key agreement protocols from multilinear forms, 104-117 [Zbl 1127.68386]
Hofheinz, Dennis; Unruh, Dominique, On the notion of statistical security in simulatability definitions, 118-133 [Zbl 1127.68380]
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy, Certificateless public key encryption without pairing, 134-148 [Zbl 1127.94358]
Wei, Victor K., Tracing-by-Linking group signatures, 149-163 [Zbl 1127.94375]
Monnerat, Jean; Vaudenay, Serge, Chaum’s designated confirmer signature revisited, 164-178 [Zbl 1127.94370]
Chou, Stephen T.; Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D., gore: routing-assisted defense against DDoS attacks, 179-193 [Zbl 1127.68375]
Jung, Souhwan; Choi, Jaeduck; Kim, Younghan; Kim, Sungi, IPSec support in NAT-PT scenario for iPv6 transition, 194-202 [Zbl 1127.68383]
Dent, Alexander W., Hybrid signcryption schemes with outsider security, 203-217 [Zbl 1127.94364]
Yang, Guomin; Wong, Duncan S.; Deng, Xiaotie, Analysis and improvement of a signcryption scheme with key privacy, 218-232 [Zbl 1127.94379]
Ma, Changshe; Chen, Kefei; Zheng, Dong; Liu, Shengli, Efficient and proactive threshold signcryption, 233-243 [Zbl 1127.68389]
Mitchell, Chris J., Error oracle attacks on CBC mode: Is there a future for CBC mode encryption?, 244-258 [Zbl 1159.68446]
Satoh, Akashi, Hardware architecture and cost estimates for breaking SHA-1, 259-273 [Zbl 1159.68449]
Wang, Peng; Feng, Dengguo; Wu, Wenling, On the security of tweakable modes of operation: TBC and TAE, 274-287 [Zbl 1159.68450]
Chang, Nam Su; Kim, Chang Han; Park, Young-Ho; Lim, Jongin, A non-redundant and efficient architecture for karatsuba-ofman algorithm, 288-299 [Zbl 1159.68436]
Hu, Chi-Ming; Tzeng, Wen-Guey, Compatible ideal contrast visual cryptography schemes with reversing, 300-313 [Zbl 1159.68440]
Lipmaa, Helger, An oblivious transfer protocol with log-squared communication, 314-328 [Zbl 1159.68444]
Desmedt, Yvo; Kurosawa, Kaoru, Electronic voting: Starting over?, 329-343 [Zbl 1159.68438]
Hwang, Yong Ho; Yum, Dae Hyun; Lee, Pil Joong, Timed-release encryption with pre-open capability and its application to certified e-mail system, 344-358 [Zbl 1127.68381]
Buldas, Ahto; Laud, Peeter; Saarepera, Märt; Willemson, Jan, Universally composable time-stamping schemes with audit, 359-373 [Zbl 1159.68434]
Peng, Kun; Boyd, Colin; Dawson, Ed, A multiplicative homomorphic sealed-bid auction based on goldwasser-micali encryption, 374-388 [Zbl 1159.68447]
Young, Adam L., Building a cryptovirus using microsoft’s cryptographic API, 389-401 [Zbl 1159.68454]
Yeo, Gary S.-W.; Phan, Raphael C.-W., On the security of the winRAR encryption method, 402-416 [Zbl 1159.68453]
Jin, Hongxia; Myles, Ginger; Lotspiech, Jeffery, Towards better software tamper resistance, 417-430 [Zbl 1159.68441]
Bauer, Lujo; Garriss, Scott; McCune, Jonathan M.; Reiter, Michael K.; Rouse, Jason; Rutenbar, Peter, Device-enabled authorization in the grey system, 431-445 [Zbl 1159.68431]
Zhang, Nan; Ryan, Mark; Guelev, Dimitar P., Evaluating access control policies through model checking, 446-460 [Zbl 1159.68455]
Kong, Yibing; Seberry, Jennifer; Getta, Janusz R.; Yu, Ping, A cryptographic solution for general access control, 461-473 [Zbl 1127.68384]
Zhang, Xiaolan; King, Brian, Integrity improvements to an RFID privacy protection protocol for anti-counterfeiting, 474-481 [Zbl 1159.68456]
Xiu, Daoxi; Liu, Zhaoyu, A formal definition for trust in distributed systems, 482-489 [Zbl 1159.68451]
Klonowski, Marek; Kutyłowski, Mirosław; Lauks, Anna; Zagórski, Filip, A practical voting scheme with receipts, 490-497 [Zbl 1159.94363]
Wang, Zhenghong; Lee, Ruby B., New constructive approach to covert channel modeling and channel capacity estimation, 498-505 [Zbl 1127.68399]
Florez-Larrahondo, German; Bridges, Susan M.; Vaughn, Rayford, Efficient modeling of discrete events for anomaly detection using hidden Markov models, 506-514 [Zbl 1127.68377]

MSC:

68-06 Proceedings, conferences, collections, etc. pertaining to computer science
68P25 Data encryption (aspects in computer science)
00B25 Proceedings of conferences of miscellaneous specific interest

Citations:

Zbl 1056.68020
PDFBibTeX XMLCite
Full Text: DOI