Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings [1 ed.]
3540232087, 9783540232087, 9783540301448
The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop
Table of contents : Front Matter....Pages - Practical Authenticated Key Agreement Using Passwords....Pages 1-12 Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks....Pages 13-24 Storage-Efficient Stateless Group Key Revocation....Pages 25-38 Low-Level Ideal Signatures and General Integrity Idealization....Pages 39-51 Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA....Pages 52-60 How to Break and Repair a Universally Composable Signature Functionality....Pages 61-72 RSA Accumulator Based Broadcast Encryption....Pages 73-86 Chameleon Hashing Without Key Exposure....Pages 87-98 Radix- r Non-Adjacent Form....Pages 99-110 On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor....Pages 111-122 Security Analysis of Two Signcryption Schemes....Pages 123-133 On The Security of Key Derivation Functions....Pages 134-145 Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery....Pages 146-157 A Model for the Semantics of Attack Signatures in Misuse Detection Systems....Pages 158-169 Detection of Sniffers in an Ethernet Network....Pages 170-182 Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks....Pages 183-194 Securing DBMS: Characterizing and Detecting Query Floods....Pages 195-206 An XML-Based Approach to Document Flow Verification....Pages 207-218 Model-Checking Access Control Policies....Pages 219-230 A Distributed High Assurance Reference Monitor....Pages 231-244 Using Mediated Identity-Based Cryptography to Support Role-Based Access Control....Pages 245-256 Towards Human Interactive Proofs in the Text-Domain....Pages 257-267 Image Recognition CAPTCHAs....Pages 268-279 A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model....Pages 280-291 Certificate Recommendations to Improve the Robustness of Web of Trust....Pages 292-303 Universally Composable Secure Mobile Agent Computation....Pages 304-317 Re-thinking Security in IP Based Micro-Mobility....Pages 318-329 Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group....Pages 330-341 Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions....Pages 342-353 Provable Unlinkability Against Traffic Analysis Already After $\mathcal{O}(\log(n))~$ Steps!....Pages 354-366 An Efficient Online Electronic Cash with Unlinkable Exact Payments....Pages 367-378 Modifiable Digital Content Protection in P2P....Pages 379-390 Survey on the Technological Aspects of Digital Rights Management....Pages 391-403 Detecting Software Theft via Whole Program Path Birthmarks....Pages 404-415 Effective Security Requirements Analysis: HAZOP and Use Cases....Pages 416-427 The Obfuscation Executive....Pages 428-440 Back Matter....Pages -