Information Security: 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual international conference covering research in theory and applications of information security, aiming to attract high quality papers in all of its technical aspects. ISC was ?rst initiated as a workshop (ISW) in Japan in 1997, ISW 1999 was held in Malaysia and ISW 2000 in Australia. The name was changed to the current one when the conf- ence was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), the UK (ISC 2003), the USA (ISC 2004), Singapore (ISC 2005),and Greece (ISC 2006). This year the event wassponsored by the Univ- sidad T´ ecnica Federico Santa Mar´ ?a (Valpara´ ?so, Chile), the Support Center for AdvancedTelecommunicationsTechnologyResearch,Foundation,SCAT(Tokyo, Japan), Microsoft Corporation, and Yahoo! Research. Re?ectingtheconference’sbroadscope,thisyear’smainProgramCommittee consisted of a relatively large number (49) of experts. Additionally, given the timely topic of cryptanalysis and design of hash functions and the NIST hash competition, the conference also featured a special Hash Subcommittee, chaired by Arjen Lenstra (EPFL and Bell Labs), as well as a panel on hashing, chaired by Bill Burr (NIST). The conference received 116 submissions, 29 of which were selected by the committee members for presentation at the conference, based on quality, originality and relevance. Each paper was anonymously reviewed by at least three committee members.

Author(s): Thomas Raffetseder, Christopher Kruegel, Engin Kirda (auth.), Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta (eds.)
Series: Lecture Notes in Computer Science 4779 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 440
Tags: Data Encryption; Operating Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Special Purpose and Application-Based Systems

Front Matter....Pages -
Detecting System Emulators....Pages 1-18
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems....Pages 19-36
E-NIPS: An Event-Based Network Intrusion Prediction System....Pages 37-52
Enabling Fairer Digital Rights Management with Trusted Computing....Pages 53-70
Traitor Tracing with Optimal Transmission Rate....Pages 71-88
The Security of Elastic Block Ciphers Against Key-Recovery Attacks....Pages 89-103
Impossible-Differential Attacks on Large-Block Rijndael....Pages 104-117
High-Speed Pipelined Hardware Architecture for Galois Counter Mode....Pages 118-129
Efficient Committed Oblivious Transfer of Bit Strings....Pages 130-144
An Efficient Certified Email Protocol....Pages 145-157
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability....Pages 158-174
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures....Pages 175-188
Identity-Based Proxy Re-encryption Without Random Oracles....Pages 189-202
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension....Pages 203-220
Small Private-Exponent Attack on RSA with Primes Sharing Bits....Pages 221-229
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2....Pages 230-248
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py....Pages 249-262
Queue Management as a DoS Counter-Measure?....Pages 263-280
On the Concept of Software Obfuscation in Computer Security....Pages 281-298
Specifying Imperative Data Obfuscations....Pages 299-314
Token-Controlled Public Key Encryption in the Standard Model....Pages 315-332
Trapdoor Permutation Polynomials of ℤ/ n ℤ and Public Key Cryptosystems....Pages 333-350
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring....Pages 351-361
Towards a DL-Based Additively Homomorphic Encryption Scheme....Pages 362-375
Differential Properties of Elliptic Curves and Blind Signatures....Pages 376-389
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation....Pages 390-406
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control....Pages 407-422
Efficient Negative Databases from Cryptographic Hash Functions....Pages 423-436
Back Matter....Pages -