This book constitutes the refereed proceedings of the 4th international Information Security Conference, ISC 2001, held in Malaga, Spain in October 2001.
The 37 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections on key distribution, protocols, enhancing technologies, privacy, software protection, message hiding, PKI issues and protocols, hardware/software implementations, cryptanalysis and prevention, implementations, non-repudiation techniques, and contracts and auctions.
Author(s): Carlo Blundo, Paolo D’Arco, Vanesa Daza, Carles Padró (auth.), George I. Davida, Yair Frankel (eds.)
Series: Lecture Notes in Computer Science 2200
Edition: 1
Publisher: Springer Berlin Heidelberg
Year: 2001
Language: English
Pages: XIV, 562 p.
Content:
Front Matter....Pages I-XIII
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures....Pages 1-17
Privacy Amplification Theorem for Noisy Main Channel....Pages 18-26
Efficient Kerberized Multicast in a Practical Distributed Setting....Pages 27-45
Suitability of a Classical Analysis Method for E-commerce Protocols....Pages 46-62
Hyppocrates A New Proactive Password Checker....Pages 63-80
Lenient/Strict Batch Verification in Several Groups....Pages 81-94
Absolute Privacy in Voting....Pages 95-109
A Logical Model for Privacy Protection....Pages 110-124
DISSECT: DIStribution for SECurity Tool....Pages 125-143
An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs....Pages 144-155
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography....Pages 156-165
Robust New Method in Frequency Domain Watermarking....Pages 166-182
On the Complexity of Public-Key Certificate Validation....Pages 183-203
Liability of Certification Authorities: A Juridical Point of View....Pages 204-219
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board....Pages 220-234
Elliptic Curve Arithmetic Using SIMD....Pages 235-247
On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms....Pages 248-265
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator....Pages 266-279
A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH....Pages 280-293
Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds....Pages 294-309
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks....Pages 310-323
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems....Pages 324-334
A Secure Publishing Service for Digital Libraries of XML Documents....Pages 335-346
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party....Pages 347-362
Persistent Authenticated Dictionaries and Their Applications....Pages 363-378
Efficient Optimistic N-Party Contract Signing Protocol....Pages 379-393
Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison....Pages 394-407
Oblivious Image Watermarking Robust against Scaling and Geometric Distortions....Pages 408-419
Fingerprinting Text in Logical Markup Languages....Pages 420-432
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery....Pages 433-445
Efficient Transferable Cash with Group Signatures....Pages 446-461
An Auditable Metering Scheme for Web Advertisement Applications....Pages 462-474
Broker-Based Secure Negotiation of Intellectual Property Rights....Pages 475-485
Design of the Decision Support System for Network Security Management to Secure Enterprise Network....Pages 486-496
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis....Pages 497-511
Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD....Pages 512-535
Back Matter....Pages 536-552
....Pages 553-554