Information Security 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 – September 2, 2006. The Conference was organized by the University of the Aegean, Greece. ISC was first initiated as a workshop, ISW in Japan in 1997, ISW...
Other Authors: | , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2006, 2006
|
Edition: | 1st ed. 2006 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice
- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
- Collusion-Free Policy-Based Encryption
- Pervasive Computing
- Using Multiple Smart Cards for Signing Messages at Malicious Terminals
- Diverging Keys in Wireless Sensor Networks
- Encryption II
- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
- Transparent Image Encryption Using Progressive JPEG
- Network Security
- Preserving TCP Connections Across Host Address Changes
- A Security Architecture for Protecting LAN Interactions
- Simulation of Internet DDoS Attacks and Defense
- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr
- Watermarking and DRM
- Rights Protection for Data Cubes
- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM)
- IntrusionDetection and Worms
- Resistance Analysis to Intruders’ Evasion of Detecting Intrusion
- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks
- Anomaly Intrusion Detection Based on Clustering a Data Stream
- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation
- Key Exchange
- An Authentication and Key Exchange Protocol for Secure Credential Services
- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
- Security Protocols and Formal Methods
- Formalising Receipt-Freeness
- Enhancing the Security and Efficiency of 3-D Secure
- Designing and Verifying Core Protocols for Location Privacy
- Information Systems Security
- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches
- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness
- Software Security
- Extending .NET Security to Unmanaged Code
- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation
- Privacy and Anonymity
- Low Latency Anonymity with Mix Rings
- Breaking Four Mix-Related Schemes Based on Universal Re-encryption
- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy
- Protecting Data Privacy Through Hard-to-Reverse Negative Databases
- Block Ciphers and Hash Functions
- Related-Key Rectangle Attack on 42-Round SHACAL-2
- On the Collision Resistance of RIPEMD-160
- Digital Signatures
- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption
- Multi-party Concurrent Signatures
- Formal Security Model of Multisignatures
- Cryptanalysis of Variants of UOV
- Stream Ciphers
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Encryption I