This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008.
The 29 revised full papers were carefully reviewed and selected from 95 submissions. The papers cover a wide range of topics in mathematics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve based security practice, security computation and so forth.
Author(s): A. Salaiwarakul, M. D. Ryan (auth.), Liqun Chen, Yi Mu, Willy Susilo (eds.)
Series: Lecture Notes in Computer Science 4991 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008
Language: English
Pages: 420
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval
Front Matter....Pages -
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol....Pages 1-13
An On-Line Secure E-Passport Protocol....Pages 14-28
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly....Pages 29-44
1-out-of- n Oblivious Signatures....Pages 45-55
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes....Pages 56-70
Private Query on Encrypted Data in Multi-user Settings....Pages 71-85
Towards Tamper Resistant Code Encryption: Practice and Experience....Pages 86-100
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh’s HIBE Scheme....Pages 101-115
RSA Moduli with a Predetermined Portion: Techniques and Applications....Pages 116-130
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs....Pages 131-145
Secure Cryptographic Precomputation with Insecure Memory....Pages 146-160
Securing Peer-to-Peer Distributions for Mobile Devices....Pages 161-175
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks....Pages 176-187
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers....Pages 188-202
PROBE: A Process Behavior-Based Host Intrusion Prevention System....Pages 203-217
Towards the World-Wide Quantum Network....Pages 218-232
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software....Pages 233-247
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains....Pages 248-262
Privacy of Recent RFID Authentication Protocols....Pages 263-277
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection....Pages 278-289
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation....Pages 290-303
Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic....Pages 304-318
Secure Computation of the Vector Dominance Problem....Pages 319-333
Rational Secret Sharing with Repeated Games....Pages 334-346
Distributed Private Matching and Set Operations....Pages 347-360
Computational Soundness of Non-Malleable Commitments....Pages 361-376
Square Attack on Reduced-Round Zodiac Cipher....Pages 377-391
Analysis of Zipper as a Hash Function....Pages 392-403
On the Importance of the Key Separation Principle for Different Modes of Operation....Pages 404-418
Back Matter....Pages -