Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings by Tzong-Chen WuInformation Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings by Tzong-Chen Wu

Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18…

byTzong-Chen WuEditorChin-Laung Lei, Vincent Rijmen

Paperback | August 25, 2008

Pricing and Purchase Info

$191.95

Earn 960 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

paperwasanonymouslyreviewedbyatleastthreecommitteemembers.Inorderto encourageandpromotestudentparticipation,theISC2008ProgramCommittee selected three student-coauthored papers for the Best Student Paper award,one fromeachregion:Asia,Europe,andtheAmericas.Thepaperswere,respectively, "Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family," bySomitraSanadhyaandPalashSarkar(IndianStatisticalInstitute,India),"C- lisions for RC4-Hash," by Sebastiaan Indesteege and Bart Preneel (Katholieke UniversiteitLeuven,Belgium),and"ProxyRe-signaturesintheStandardModel," byShermanS.M. Chow(New YorkUniversity,USA) andRaphaelPhan(Lou- borough University, UK). The program also included invited speeches by Doug Tygar(UC Berkeley,USA) andTatsuakiOkamoto(NTT, Japan). Many people helped to make ISC 2008 successful. We would like to thank all thosewhocontributedtothetechnicalprogramandtoorganizingtheconference.
Title:Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18…Format:PaperbackDimensions:504 pages, 23.5 × 15.5 × 0.07 inPublished:August 25, 2008Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540858849

ISBN - 13:9783540858843

Reviews

Table of Contents

Trusted Computing.- Property-Based TPM Virtualization.- A Demonstrative Ad Hoc Attestation System.- Property-Based Attestation without a Trusted Third Party.- The Reduced Address Space (RAS) for Application Memory Authentication.- Database and System Security.- An Efficient PIR Construction Using Trusted Hardware.- Athos: Efficient Authentication of Outsourced File Systems.- BotTracer: Execution-Based Bot-Like Malware Detection.- Intrusion Detection.- Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.- Distinguishing between FE and DDoS Using Randomness Check.- Network Security.- Antisocial Networks: Turning a Social Network into a Botnet.- Compromising Anonymity Using Packet Spinning.- Behavior-Based Network Access Control: A Proof-of-Concept.- Path-Based Access Control for Enterprise Networks.- Cryptanalysis.- Cryptanalysis of Rabbit.- Algebraic Attack on HFE Revisited.- Revisiting Wiener's Attack - New Weak Keys in RSA.- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family.- Digital Signatures.- Proxy Re-signatures in the Standard Model.- An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner.- Certificate-Based Signature Schemes without Pairings or Random Oracles.- AES Special Session.- Improved Impossible Differential Attacks on Large-Block Rijndael.- A Five-Round Algebraic Property of the Advanced Encryption Standard.- Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication.- Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.- Symmetric Cryptography and Hash Functions.- Collisions for RC4-Hash.- New Applications of Differential Bounds of the SDS Structure.- Authentication.- HAPADEP: Human-Assisted Pure Audio Device Pairing.- One-Time Password Access to Any Server without Changing the Server.- Can "Something You Know" Be Saved?.- Security Protocols.- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings.- A New (k,n)-Threshold Secret Sharing Scheme and Its Extension.- Strong Accumulators from Collision-Resistant Hashing.- A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.