Information Security 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 – September 2, 2006. The Conference was organized by the University of the Aegean, Greece. ISC was first initiated as a workshop, ISW in Japan in 1997, ISW...

Full description

Bibliographic Details
Other Authors: Katsikas, Sokratis K. (Editor), Backes, Michael (Editor), Gritzalis, Stefanos (Editor), Preneel, Bart (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2006, 2006
Edition:1st ed. 2006
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice
  • On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
  • Collusion-Free Policy-Based Encryption
  • Pervasive Computing
  • Using Multiple Smart Cards for Signing Messages at Malicious Terminals
  • Diverging Keys in Wireless Sensor Networks
  • Encryption II
  • A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
  • Transparent Image Encryption Using Progressive JPEG
  • Network Security
  • Preserving TCP Connections Across Host Address Changes
  • A Security Architecture for Protecting LAN Interactions
  • Simulation of Internet DDoS Attacks and Defense
  • SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr
  • Watermarking and DRM
  • Rights Protection for Data Cubes
  • An Efficient Probabilistic Packet Marking Scheme (NOD-PPM)
  • IntrusionDetection and Worms
  • Resistance Analysis to Intruders’ Evasion of Detecting Intrusion
  • A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks
  • Anomaly Intrusion Detection Based on Clustering a Data Stream
  • Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation
  • Key Exchange
  • An Authentication and Key Exchange Protocol for Secure Credential Services
  • A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
  • Security Protocols and Formal Methods
  • Formalising Receipt-Freeness
  • Enhancing the Security and Efficiency of 3-D Secure
  • Designing and Verifying Core Protocols for Location Privacy
  • Information Systems Security
  • Delegation in a Distributed Healthcare Context: A Survey of Current Approaches
  • Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness
  • Software Security
  • Extending .NET Security to Unmanaged Code
  • Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation
  • Privacy and Anonymity
  • Low Latency Anonymity with Mix Rings
  • Breaking Four Mix-Related Schemes Based on Universal Re-encryption
  • Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy
  • Protecting Data Privacy Through Hard-to-Reverse Negative Databases
  • Block Ciphers and Hash Functions
  • Related-Key Rectangle Attack on 42-Round SHACAL-2
  • On the Collision Resistance of RIPEMD-160
  • Digital Signatures
  • Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption
  • Multi-party Concurrent Signatures
  • Formal Security Model of Multisignatures
  • Cryptanalysis of Variants of UOV
  • Stream Ciphers
  • Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
  • Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
  • Encryption I