Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4–7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi’an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga, Spain (ICICS 2004); and Beijing, China (ICICS 2005). The conference proceedings of the past seven events have been published by Springer in the Lecture Notes in Computer Science series, in LNCS1334,LNCS1726,LNCS2229,LNCS 2513,LNCS 2836, LNCS 3269, and LNCS 3783, respectively. This year we received a total of 119 submissions on various aspects of - hoc and sensor network security. The Program Committee selected 22 regular papers and 17 short papers that cover a variety of topics, including security protocols, applied cryptography and cryptanalysis, access control in distributed systems, privacy, malicious code, network and systems security, and security implementations. Putting together ICICS 2006 was a team e?ort. First of all, we would like to thank the authors of every paper, whether accepted or not, for submitting their papers to ICICS 2006. We would like to express our gratitude to the Program Committee members and the external reviewers, who worked very hard in - viewing the papers and providing suggestions for their improvements.

Author(s): Chae Hoon Lim, Taekyoung Kwon (auth.), Peng Ning, Sihan Qing, Ninghui Li (eds.)
Series: Lecture Notes in Computer Science 4307 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 562
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer....Pages 1-20
A Robust and Secure RFID-Based Pedigree System (Short Paper)....Pages 21-29
A Topological Condition for Solving Fair Exchange in Byzantine Environments....Pages 30-49
A Security Analysis of the Precise Time Protocol (Short Paper)....Pages 50-59
An Identity-Based Proxy Signature Scheme from Pairings....Pages 60-71
Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper)....Pages 72-81
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)....Pages 82-91
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size....Pages 92-111
Trace-Driven Cache Attacks on AES (Short Paper)....Pages 112-121
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols....Pages 122-138
Defining and Measuring Policy Coverage in Testing Access Control Policies....Pages 139-158
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper)....Pages 159-173
An Operating System Design for the Security Architecture for Microprocessors....Pages 174-189
Point-Based Trust: Define How Much Privacy Is Worth....Pages 190-209
Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets....Pages 210-227
Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)....Pages 228-237
An Anonymous Authentication Scheme for Identification Card....Pages 238-248
A Wireless Covert Channel on Smart Cards (Short Paper)....Pages 249-259
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution....Pages 260-281
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)....Pages 282-291
An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper)....Pages 292-301
Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario....Pages 302-321
An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)....Pages 322-331
Provably Correct Runtime Enforcement of Non-interference Properties....Pages 332-351
An Attack on SMC-Based Software Protection....Pages 352-368
Modular Behavior Profiles in Systems with Shared Libraries (Short Paper)....Pages 369-378
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic....Pages 379-398
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards....Pages 399-409
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)....Pages 410-419
Seifert’s RSA Fault Attack: Simplified Analysis and Generalizations....Pages 420-434
The Fairness of Perfect Concurrent Signatures....Pages 435-451
Secure Set Membership Using 3Sat ....Pages 452-468
Left-to-Right Signed-Bit τ -Adic Representations of n Integers (Short Paper)....Pages 469-478
Universal Designated Verifier Signature Without Delegatability....Pages 479-498
Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper)....Pages 499-506
A Fast RSA Implementation on Itanium 2 Processor....Pages 507-518
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)....Pages 519-528
Threshold Implementations Against Side-Channel Attacks and Glitches....Pages 529-545
Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper)....Pages 546-555
Back Matter....Pages -