Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.

Author(s): Paul C. van Oorschot (auth.), Colin Boyd, Wenbo Mao (eds.)
Series: Lecture Notes in Computer Science 2851
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 448
Tags: Data Encryption; Computer Communication Networks; Special Purpose and Application-Based Systems; Operating Systems; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems

Front Matter....Pages -
Revisiting Software Protection....Pages 1-13
Enabling Shared Audit Data....Pages 14-28
Cryptographically Generated Addresses (CGA)....Pages 29-43
Validating and Securing Spontaneous Associations between Wireless Devices....Pages 44-53
Single Sign-On Using Trusted Platforms....Pages 54-68
Easy Verifiable Primitives and Practical Public Key Cryptosystems....Pages 69-83
Reactively Secure Signature Schemes....Pages 84-95
Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation....Pages 96-110
A Fast Signature Scheme Based on New On-line Computation....Pages 111-121
Distributed RSA Signature Schemes for General Access Structures....Pages 122-136
Divisible Voting Scheme....Pages 137-150
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations....Pages 151-164
The Design and Implementation of Protocol-Based Hidden Key Recovery....Pages 165-179
Intrinsic Limitations of Digital Signatures and How to Cope with Them....Pages 180-192
On the Security of Fair Non-repudiation Protocols....Pages 193-207
Security Analysis of a Password Authenticated Key Exchange Protocol....Pages 208-217
Zero-Value Point Attacks on Elliptic Curve Cryptosystem....Pages 218-233
Cryptanalysis of an Algebraic Privacy Homomorphism....Pages 234-239
Analysis of the Insecurity of ECMQV with Partially Known Nonces....Pages 240-251
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES....Pages 252-266
A Note on Weak Keys of PES, IDEA, and Some Extended Variants....Pages 267-279
Foundations of Differential Cryptanalysis in Abelian Groups....Pages 280-294
Trust and Authorization in Pervasive B2E Scenarios....Pages 295-309
A Logic Model for Temporal Authorization Delegation with Negation....Pages 310-324
Zero-Distortion Authentication Watermarking....Pages 325-337
Designated Verification of Non-invertible Watermark....Pages 338-351
Proactive Software Tampering Detection....Pages 352-365
Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits....Pages 366-380
Towards a Business Process-Driven Framework for Security Engineering with the UML....Pages 381-395
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes....Pages 396-407
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations....Pages 408-421
Short c -Secure Fingerprinting Codes....Pages 422-427
The Role of Arbiters in Asymmetric Authentication Schemes....Pages 428-441
Back Matter....Pages -