Advances in Computer Science - ASIAN 2009. Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009.

The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.

Author(s): Jean Goubault-Larrecq (auth.), Anupam Datta (eds.)
Series: Lecture Notes in Computer Science 5913 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 159
Tags: Logics and Meanings of Programs; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Mathematical Logic and Formal Languages; Data Structures, Cryptology and Information Theory; Systems and Data Security

Front Matter....Pages -
“Logic Wins!”....Pages 1-16
Higher-Order Program Verification and Language-Based Security....Pages 17-23
Deducibility Constraints....Pages 24-38
Automated Security Proof for Symmetric Encryption Modes....Pages 39-53
Noninterference with Dynamic Security Domains and Policies....Pages 54-68
A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers....Pages 69-78
A Logic for Formal Verification of Quantum Programs....Pages 79-93
Reducing Equational Theories for the Decision of Static Equivalence....Pages 94-108
A Simulation-Based Treatment of Authenticated Message Exchange....Pages 109-123
Trusted Deployment of Virtual Execution Environment in Grid Systems....Pages 124-136
A Dolev-Yao Model for Zero Knowledge....Pages 137-146
A Special Proxy Signature Scheme with Multi-warrant....Pages 147-157
Back Matter....Pages -