Wu / Lee / Lei | Information Security | Buch | 978-3-540-85884-3 | sack.de

Buch, Englisch, 504 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 785 g

Reihe: Information Systems and Applications, incl. Internet/Web, and HCI

Wu / Lee / Lei

Information Security

11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings
2008
ISBN: 978-3-540-85884-3
Verlag: Springer Berlin Heidelberg

11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings

Buch, Englisch, 504 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 785 g

Reihe: Information Systems and Applications, incl. Internet/Web, and HCI

ISBN: 978-3-540-85884-3
Verlag: Springer Berlin Heidelberg


paperwasanonymouslyreviewedbyatleastthreecommitteemembers.Inorderto encourageandpromotestudentparticipation,theISC2008ProgramCommittee selected three student-coauthored papers for the Best Student Paper award,one fromeachregion:Asia,Europe,andtheAmericas.Thepaperswere,respectively, “Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family,” bySomitraSanadhyaandPalashSarkar(IndianStatisticalInstitute,India),“C- lisions for RC4-Hash,” by Sebastiaan Indesteege and Bart Preneel (Katholieke UniversiteitLeuven,Belgium),and“ProxyRe-signaturesintheStandardModel,” byShermanS.M. Chow(New YorkUniversity,USA) andRaphaelPhan(Lou- borough University, UK). The program also included invited speeches by Doug Tygar(UC Berkeley,USA) andTatsuakiOkamoto(NTT, Japan). Many people helped to make ISC 2008 successful. We would like to thank all thosewhocontributedtothetechnicalprogramandtoorganizingtheconference.

Wu / Lee / Lei Information Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Trusted Computing.- Property-Based TPM Virtualization.- A Demonstrative Ad Hoc Attestation System.- Property-Based Attestation without a Trusted Third Party.- The Reduced Address Space (RAS) for Application Memory Authentication.- Database and System Security.- An Efficient PIR Construction Using Trusted Hardware.- Athos: Efficient Authentication of Outsourced File Systems.- BotTracer: Execution-Based Bot-Like Malware Detection.- Intrusion Detection.- Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.- Distinguishing between FE and DDoS Using Randomness Check.- Network Security.- Antisocial Networks: Turning a Social Network into a Botnet.- Compromising Anonymity Using Packet Spinning.- Behavior-Based Network Access Control: A Proof-of-Concept.- Path-Based Access Control for Enterprise Networks.- Cryptanalysis.- Cryptanalysis of Rabbit.- Algebraic Attack on HFE Revisited.- Revisiting Wiener’s Attack – New Weak Keys in RSA.- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family.- Digital Signatures.- Proxy Re-signatures in the Standard Model.- An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner.- Certificate-Based Signature Schemes without Pairings or Random Oracles.- AES Special Session.- Improved Impossible Differential Attacks on Large-Block Rijndael.- A Five-Round Algebraic Property of the Advanced Encryption Standard.- Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication.- Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.- Symmetric Cryptography and Hash Functions.- Collisions for RC4-Hash.- New Applications of Differential Bounds of the SDS Structure.- Authentication.- HAPADEP: Human-Assisted Pure AudioDevice Pairing.- One-Time Password Access to Any Server without Changing the Server.- Can “Something You Know” Be Saved?.- Security Protocols.- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings.- A New (k,n)-Threshold Secret Sharing Scheme and Its Extension.- Strong Accumulators from Collision-Resistant Hashing.- A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.