Information Security: 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 – September 2, 2006. The Conference was organized by the University of the Aegean, Greece. ISC was first initiated as a workshop, ISW in Japan in 1997, ISW 1999 in Mal- sia, ISW 2000 in Australia and then changed to the current name ISC when it was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), UK (ISC 2003), USA (ISC 2004), and Singapore (ISC 2005). ISC 2006 provided an international forum for sharing original research results and application experiences among specialists in fundamental and applied problems of - formation security. In response to the Call for Papers, 188 papers were submitted. Each paper was - viewed by three members of the PC, on the basis of their significance, novelty, and technical quality. Of the papers submitted, 38 were selected for presentation, with an acceptance rate of 20%.

Author(s): Patrick Klinkoff, Christopher Kruegel, Engin Kirda, Giovanni Vigna (auth.), Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel (eds.)
Series: Lecture Notes in Computer Science 4176 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 548
Tags: Data Encryption; Operating Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Special Purpose and Application-Based Systems; Management of Computing and Information Systems

Front Matter....Pages -
Extending .NET Security to Unmanaged Code....Pages 1-16
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation....Pages 17-31
Low Latency Anonymity with Mix Rings....Pages 32-45
Breaking Four Mix-Related Schemes Based on Universal Re-encryption....Pages 46-59
Weak k -Anonymity: A Low-Distortion Model for Protecting Privacy....Pages 60-71
Protecting Data Privacy Through Hard-to-Reverse Negative Databases....Pages 72-84
Related-Key Rectangle Attack on 42-Round SHACAL-2....Pages 85-100
On the Collision Resistance of RIPEMD-160....Pages 101-116
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption....Pages 117-130
Multi-party Concurrent Signatures....Pages 131-145
Formal Security Model of Multisignatures....Pages 146-160
Cryptanalysis of Variants of UOV....Pages 161-170
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles....Pages 171-186
Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s....Pages 187-202
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice....Pages 203-216
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search....Pages 217-232
Collusion-Free Policy-Based Encryption....Pages 233-245
Using Multiple Smart Cards for Signing Messages at Malicious Terminals....Pages 246-256
Diverging Keys in Wireless Sensor Networks....Pages 257-269
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption....Pages 270-285
Transparent Image Encryption Using Progressive JPEG....Pages 286-298
Preserving TCP Connections Across Host Address Changes....Pages 299-310
A Security Architecture for Protecting LAN Interactions....Pages 311-326
Simulation of Internet DDoS Attacks and Defense....Pages 327-342
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr....Pages 343-358
Rights Protection for Data Cubes....Pages 359-372
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM)....Pages 373-382
Resistance Analysis to Intruders’ Evasion of Detecting Intrusion....Pages 383-397
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks....Pages 398-414
Anomaly Intrusion Detection Based on Clustering a Data Stream....Pages 415-426
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation....Pages 427-442
An Authentication and Key Exchange Protocol for Secure Credential Services....Pages 443-458
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders....Pages 459-475
Formalising Receipt-Freeness....Pages 476-488
Enhancing the Security and Efficiency of 3-D Secure....Pages 489-501
Designing and Verifying Core Protocols for Location Privacy....Pages 502-516
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches....Pages 517-529
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness....Pages 530-545
Back Matter....Pages -