+612 9045 4394
 
CHECKOUT
Information Security : 6th International Conference, Isc 2003, Bristol, Uk, October 1-3, 2003, Proceedings - Colin Boyd

Information Security

6th International Conference, Isc 2003, Bristol, Uk, October 1-3, 2003, Proceedings

By: Colin Boyd (Editor), Wenbo Mao (Editor)

Paperback

Published: 24th September 2003
Ships: 15 business days
15 business days
$147.02
or 4 easy payments of $36.76 with Learn more

The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year's conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee, covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ] ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.

Revisiting Software Protectionp. 1
Enabling Shared Audit Datap. 14
Cryptographically Generated Addresses (CGA)p. 29
Validating and Securing Spontaneous Associations between Wireless Devicesp. 44
Single Sign-On Using Trusted Platformsp. 54
Easy Verifiable Primitives and Practical Public Key Cryptosystemsp. 69
Reactively Secure Signature Schemesp. 84
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocationp. 96
A Fast Signature Scheme Based on New On-line Computationp. 111
Distributed RSA Signature Schemes for General Access Structuresp. 122
Divisible Voting Schemep. 137
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computationsp. 151
The Design and Implementation of Protocol-Based Hidden Key Recoveryp. 165
Intrinsic Limitations of Digital Signatures and How to Cope with Themp. 180
On the Security of Fair Non-repudiation Protocolsp. 193
Security Analysis of a Password Authenticated Key Exchange Protocolp. 208
Zero-Value Point Attacks on Elliptic Curve Cryptosystemp. 218
Cryptanalysis of an Algebraic Privacy Homomorphismp. 234
Analysis of the Insecurity of ECMQV with Partially Known Noncesp. 240
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DESp. 252
A Note on Weak Keys of PES, IDEA, and Some Extended Variantsp. 267
Foundations of Differential Cryptanalysis in Abelian Groupsp. 280
Trust and Authorization in Pervasive B2E Scenariosp. 295
A Logic Model for Temporal Authorization Delegation with Negationp. 310
Zero-Distortion Authentication Watermarkingp. 325
Designated Verification of Non-invertible Watermarkp. 338
Proactive Software Tampering Detectionp. 352
Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploitsp. 366
Towards a Business Process-Driven Framework for Security Engineering with the UMLp. 381
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemesp. 396
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relationsp. 408
Short c-Secure Fingerprinting Codesp. 422
The Role of Arbiters in Asymmetric Authentication Schemesp. 428
Author Indexp. 443
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540201762
ISBN-10: 3540201769
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 448
Published: 24th September 2003
Publisher: SPRINGER VERLAG GMBH
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.39
Weight (kg): 0.64