Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009.

The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009.

Author(s): Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park (auth.), Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo (eds.)
Series: Lecture Notes in Computer Science 5576 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 841
Tags: Computer Communication Networks; Computer Systems Organization and Communication Networks; Data Structures, Cryptology and Information Theory; Data Encryption; System Performance and Evaluation; Coding and Information Theory

Front Matter....Pages -
Update on SEED: SEED-192/256....Pages 1-10
A New Double-Block-Length Hash Function Using Feistel Structure....Pages 11-20
The Dark Side of Timed Opacity....Pages 21-30
Certificateless Signature Scheme without Random Oracles....Pages 31-40
Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker....Pages 41-50
Grouping Provenance Information to Improve Efficiency of Access Control....Pages 51-59
Tagging the Turtle: Local Attestation for Kiosk Computing....Pages 60-69
Selective Regression Test for Access Control System Employing RBAC....Pages 70-79
Formal Verification for Access Control in Web Information Sharing System....Pages 80-89
Adaptive Iris Segmentation....Pages 90-99
Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person....Pages 100-109
Methodology and Tools of IS Audit and Computer Forensics – The Common Denominator....Pages 110-121
What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?....Pages 122-134
A New Strongly Secure Authenticated Key Exchange Protocol....Pages 135-144
Improved Implementations of Cryptosystems Based on Tate Pairing....Pages 145-151
Efficient Secure Multiparty Computation Protocol in Asynchronous Network....Pages 152-158
Clustering-Based Frequency l -Diversity Anonymization....Pages 159-168
Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery....Pages 169-178
A Kademlia-Based Node Lookup System for Anonymization Networks....Pages 179-189
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network....Pages 190-199
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN....Pages 200-209
Securing Mobile Phone Calls with Identity-Based Cryptography....Pages 210-222
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)....Pages 223-228
A New Approach to Malware Detection....Pages 229-238
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION....Pages 239-249
A Deployment Value Model for Intrusion Detection Sensors....Pages 250-259
Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks....Pages 260-269
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach....Pages 270-279
Signaling-Oriented DoS Attacks in UMTS Networks....Pages 280-289
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average....Pages 290-300
Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems....Pages 301-306
Efficient and Automatic Instrumentation for Packed Binaries....Pages 307-316
Secure Cover Selection Steganography....Pages 317-326
Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects....Pages 327-336
Performance Analysis of Digital Secure Voice Transmission over HF Radio Channel....Pages 337-346
Energy Analysis of Multimedia Video Streaming on Mobile Devices....Pages 347-357
Combating Index Poisoning in P2P File Sharing....Pages 358-367
A Cryptanalytic View of the NSA’s Skipjack Block Cipher Design....Pages 368-381
MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem....Pages 382-391
Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network....Pages 392-401
Design and Delivery of Undergraduate IT Security Management Course....Pages 402-411
Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data....Pages 412-421
Using a Link Metric to Improve Communication Mechanisms and Real-Time Properties in an Adaptive Middleware for Heterogeneous Sensor Networks....Pages 422-431
Performance Evaluation of DSR in Multi-services Ad Hoc Networks....Pages 432-437
Implementation and Evaluation of WiMedia MAC LSI....Pages 438-449
A Reliable and Efficient Pedal Back Data Disseminating Scheme for Ad-Hoc WSNs....Pages 450-460
Improved Location Acquisition Algorithms for the Location-Based Alert Service....Pages 461-470
An Enhanced Trust Center Based Authentication in ZigBee Networks....Pages 471-484
Sensor Disposition Problem in Wireless Ad-Hoc Sensor Networks....Pages 485-493
Performance Evaluation of Cost Effective Routing for Packet Transmissions in Mobile Ad Hoc Networks....Pages 494-501
Energy Lesser Broadcasting Algorithms Using Adjustable Transmission Ranges in Mobile Ad Hoc Networks....Pages 502-511
A Multi-Path Routing Supported Scheduling Algorithm for Multi-Channel Single-Transceiver Wireless Mesh Networks....Pages 512-521
Predictive Scheme for Location Service in Mobile Ad-Hoc Networks....Pages 522-531
An Efficient Hybrid Routing Approach for Hybrid Wireless Mesh Networks....Pages 532-542
Relationship between Motivation and Satisfaction of Online Computer Games: Evidence from Adolescent Players Using Wireless Service in Taiwan....Pages 543-552
DISHES: A Distributed Shell System for Ubiquitous Computing....Pages 553-562
Error Control Scheme of Hybrid ARQ Based on Majority Voting Bit by Bit....Pages 563-569
Secure Error-Correction Network Coding in a Randomized Setting....Pages 570-577
Bayesian Approach Based Comment Spam Defending Tool....Pages 578-587
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme....Pages 588-597
Honeybee-Based Model to Detect Intrusion....Pages 598-607
A Data Mining Framework for Building Intrusion Detection Models Based on IPv6....Pages 608-618
FPGA Implementation of Elliptic Curve Point Multiplication over GF (2 191 )....Pages 619-634
A Forward-Secrecy WTLS Handshake Protocol Based on XTR....Pages 635-643
Application of 2D Barcode in Hardcopy Document Verification System....Pages 644-651
Protecting Global SOA from DoS and Other Security Threats....Pages 652-661
CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme....Pages 662-671
HOTP-Based User Authentication Scheme in Home Networks....Pages 672-681
A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment....Pages 682-691
A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks....Pages 692-701
A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment....Pages 702-711
A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks....Pages 712-721
Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks....Pages 722-731
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)....Pages 732-740
Authenticated Encryption in WSN Using eSTREAM Ciphers....Pages 741-749
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles....Pages 750-759
Device Authentication/Authorization Protocol for Home Network in Next Generation Security....Pages 760-768
A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services....Pages 769-777
Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method....Pages 778-787
A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC....Pages 788-796
Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting....Pages 797-803
Free-Form Deformation Axis Aligned Bounding Box....Pages 804-813
A Study on Mosaic Based CCTV System Using Localization....Pages 814-822
Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in Korea....Pages 823-828
Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate....Pages 829-837
Back Matter....Pages -