Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings [1 ed.] 3540232087, 9783540232087, 9783540301448

The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop

263 67 4MB

English Pages 442 [457] Year 2004

Report DMCA / Copyright

DOWNLOAD DJVU FILE

Table of contents :
Front Matter....Pages -
Practical Authenticated Key Agreement Using Passwords....Pages 1-12
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks....Pages 13-24
Storage-Efficient Stateless Group Key Revocation....Pages 25-38
Low-Level Ideal Signatures and General Integrity Idealization....Pages 39-51
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA....Pages 52-60
How to Break and Repair a Universally Composable Signature Functionality....Pages 61-72
RSA Accumulator Based Broadcast Encryption....Pages 73-86
Chameleon Hashing Without Key Exposure....Pages 87-98
Radix- r Non-Adjacent Form....Pages 99-110
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor....Pages 111-122
Security Analysis of Two Signcryption Schemes....Pages 123-133
On The Security of Key Derivation Functions....Pages 134-145
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery....Pages 146-157
A Model for the Semantics of Attack Signatures in Misuse Detection Systems....Pages 158-169
Detection of Sniffers in an Ethernet Network....Pages 170-182
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks....Pages 183-194
Securing DBMS: Characterizing and Detecting Query Floods....Pages 195-206
An XML-Based Approach to Document Flow Verification....Pages 207-218
Model-Checking Access Control Policies....Pages 219-230
A Distributed High Assurance Reference Monitor....Pages 231-244
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control....Pages 245-256
Towards Human Interactive Proofs in the Text-Domain....Pages 257-267
Image Recognition CAPTCHAs....Pages 268-279
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model....Pages 280-291
Certificate Recommendations to Improve the Robustness of Web of Trust....Pages 292-303
Universally Composable Secure Mobile Agent Computation....Pages 304-317
Re-thinking Security in IP Based Micro-Mobility....Pages 318-329
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group....Pages 330-341
Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions....Pages 342-353
Provable Unlinkability Against Traffic Analysis Already After $\mathcal{O}(\log(n))~$ Steps!....Pages 354-366
An Efficient Online Electronic Cash with Unlinkable Exact Payments....Pages 367-378
Modifiable Digital Content Protection in P2P....Pages 379-390
Survey on the Technological Aspects of Digital Rights Management....Pages 391-403
Detecting Software Theft via Whole Program Path Birthmarks....Pages 404-415
Effective Security Requirements Analysis: HAZOP and Use Cases....Pages 416-427
The Obfuscation Executive....Pages 428-440
Back Matter....Pages -

Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings [1 ed.]
 3540232087, 9783540232087, 9783540301448

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
Recommend Papers