Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear’sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions,and wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative forum for their work. We were fortunate to have an energetic team of experts who took on the task of the program committee. Their names may be found overleaf, and we thank them warmly for their time and e?orts. This team was helped by an even larger number of external reviewers who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. We would also like to thank the advisory committee for their advice and s- port.TheexcellentlocalarrangementswerehandledbyDirkBalfanzandJessica Staddon. We made use of the electronic submission and reviewing software s- plied by COSIC at the Katholieke Universiteit Leuven. Both the software and the ISC 2004 website were run on a server at UNC Charlotte, and were perfectly maintained by Seung-Hyun Im. We also appreciate assistance from Lawrence Teo in editing the proceedings.

Author(s): Taekyoung Kwon (auth.), Kan Zhang, Yuliang Zheng (eds.)
Series: Lecture Notes in Computer Science 3225
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004

Language: English
Pages: 442
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Practical Authenticated Key Agreement Using Passwords....Pages 1-12
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks....Pages 13-24
Storage-Efficient Stateless Group Key Revocation....Pages 25-38
Low-Level Ideal Signatures and General Integrity Idealization....Pages 39-51
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA....Pages 52-60
How to Break and Repair a Universally Composable Signature Functionality....Pages 61-72
RSA Accumulator Based Broadcast Encryption....Pages 73-86
Chameleon Hashing Without Key Exposure....Pages 87-98
Radix- r Non-Adjacent Form....Pages 99-110
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor....Pages 111-122
Security Analysis of Two Signcryption Schemes....Pages 123-133
On The Security of Key Derivation Functions....Pages 134-145
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery....Pages 146-157
A Model for the Semantics of Attack Signatures in Misuse Detection Systems....Pages 158-169
Detection of Sniffers in an Ethernet Network....Pages 170-182
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks....Pages 183-194
Securing DBMS: Characterizing and Detecting Query Floods....Pages 195-206
An XML-Based Approach to Document Flow Verification....Pages 207-218
Model-Checking Access Control Policies....Pages 219-230
A Distributed High Assurance Reference Monitor....Pages 231-244
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control....Pages 245-256
Towards Human Interactive Proofs in the Text-Domain....Pages 257-267
Image Recognition CAPTCHAs....Pages 268-279
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model....Pages 280-291
Certificate Recommendations to Improve the Robustness of Web of Trust....Pages 292-303
Universally Composable Secure Mobile Agent Computation....Pages 304-317
Re-thinking Security in IP Based Micro-Mobility....Pages 318-329
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group....Pages 330-341
Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions....Pages 342-353
Provable Unlinkability Against Traffic Analysis Already After $\mathcal{O}(\log(n))~$ Steps!....Pages 354-366
An Efficient Online Electronic Cash with Unlinkable Exact Payments....Pages 367-378
Modifiable Digital Content Protection in P2P....Pages 379-390
Survey on the Technological Aspects of Digital Rights Management....Pages 391-403
Detecting Software Theft via Whole Program Path Birthmarks....Pages 404-415
Effective Security Requirements Analysis: HAZOP and Use Cases....Pages 416-427
The Obfuscation Executive....Pages 428-440
Back Matter....Pages -