Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science, 3225) 🔍
Kan Zhang (editor), Yuliang Zheng (editor) Springer Spektrum. in Springer-Verlag GmbH, Lecture notes in computer science, 3225, 1st ed. 2004, Berlin, Heidelberg, 2004
英语 [en] · DJVU · 4.3MB · 2004 · 📘 非小说类图书 · 🚀/duxiu/lgli/lgrs · Save
描述
The 2004 Information Security Conference Was The Seventh In A Series That Started With The Information Security Workshop In 1997. A Distinct Feature Of This Series Is The Wide Coverage Of Topics With The Aim Of Encouraging Interaction Between Researchers In Di?erent Aspects Of Information Security. This Trend C- Tinuedintheprogramofthisyear’sconference.theprogramcommitteereceived 106 Submissions, From Which 36 Were Selected For Presentation. Each Submission Was Reviewed By At Least Three Experts In The Relevant Research Area. We Would Liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions,and Wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative Forum For Their Work. We Were Fortunate To Have An Energetic Team Of Experts Who Took On The Task Of The Program Committee. Their Names May Be Found Overleaf, And We Thank Them Warmly For Their Time And E?orts. This Team Was Helped By An Even Larger Number Of External Reviewers Who Reviewed Papers In Their Particular Areas Of Expertise. A List Of These Names Is Also Provided, Which We Hope Is Complete. We Would Also Like To Thank The Advisory Committee For Their Advice And S- Port.theexcellentlocalarrangementswerehandledbydirkbalfanzandjessica Staddon. We Made Use Of The Electronic Submission And Reviewing Software S- Plied By Cosic At The Katholieke Universiteit Leuven. Both The Software And The Isc 2004 Website Were Run On A Server At Unc Charlotte, And Were Perfectly Maintained By Seung-hyun Im. We Also Appreciate Assistance From Lawrence Teo In Editing The Proceedings. Key Management -- Practical Authenticated Key Agreement Using Passwords -- Further Analysis Of Password Authenticated Key Exchange Protocol Based On Rsa For Imbalanced Wireless Networks -- Storage-efficient Stateless Group Key Revocation -- Digital Signatures -- Low-level Ideal Signatures And General Integrity Idealization -- Cryptanalysis Of A Verifiably Committed Signature Scheme Based On Gps And Rsa -- How To Break And Repair A Universally Composable Signature Functionality -- New Algorithms -- Rsa Accumulator Based Broadcast Encryption -- Chameleon Hashing Without Key Exposure -- Radix-r Non-adjacent Form -- Cryptanalysis -- On Related-key And Collision Attacks: The Case For The Ibm 4758 Cryptoprocessor -- Security Analysis Of Two Signcryption Schemes -- On The Security Of Key Derivation Functions -- Intrusion Detection -- Evaluating The Impact Of Intrusion Detection Deficiencies On The Cost-effectiveness Of Attack Recovery --^ A Model For The Semantics Of Attack Signatures In Misuse Detection Systems -- Detection Of Sniffers In An Ethernet Network -- Using Greedy Hamiltonian Call Paths To Detect Stack Smashing Attacks -- Securing Dbms: Characterizing And Detecting Query Floods -- Access Control -- An Xml-based Approach To Document Flow Verification -- Model-checking Access Control Policies -- A Distributed High Assurance Reference Monitor -- Using Mediated Identity-based Cryptography To Support Role-based Access Control -- Human Authentication -- Towards Human Interactive Proofs In The Text-domain -- Image Recognition Captchas -- Certificate Management -- A Hierarchical Key-insulated Signature Scheme In The Ca Trust Model -- Certificate Recommendations To Improve The Robustness Of Web Of Trust -- Mobile And Ad Hoc Security -- Universally Composable Secure Mobile Agent Computation -- Re-thinking Security In Ip Based Micro-mobility --^ Shared-key Signature And Its Application To Anonymous Authentication In Ad Hoc Group -- Web Security -- Prevent Online Identity Theft – Using Network Smart Cards For Secure Online Transactions -- Provable Unlinkability Against Traffic Analysis Already After Steps! -- An Efficient Online Electronic Cash With Unlinkable Exact Payments -- Digital Rights Management -- Modifiable Digital Content Protection In P2p -- Survey On The Technological Aspects Of Digital Rights Management -- Detecting Software Theft Via Whole Program Path Birthmarks -- Software Security -- Effective Security Requirements Analysis: Hazop And Use Cases -- The Obfuscation Executive. Kan Zhang, Yuliang Zheng (eds.). Includes Bibliographical References And Index.
备用文件名
lgrsnf/Information Security, 7 conf., ISC 2004(LNCS3225, Springer, 2004)(ISBN 3540232087)(T)(C)(O)(457s).djvu
备选标题
Information security : ... international conference ; proceedings. 7 (2004), Palo Alto, CA, USA, September 27-29, 2004
备选标题
Lecture Notes in Computer Science 3225 Information Security 7th International Conference,ISC 2004
备选作者
Kan Zhang; Yuliang Zheng; ISC (Conference : Information security)
备选作者
Masahiro Mambo; Eiji Okamoto; Josef Pieprzyk; ISC; ISW
备选作者
Kan Zhang ; Yuliang Zheng,Springer
备选作者
ISC 2004 (2004 Palo Alto, Calif.)
备选作者
Kan Zhang, Yuliang Zheng (eds.)
备用出版商
Springer Berlin Heidelberg : Imprint : Springer
备用出版商
Steinkopff. in Springer-Verlag GmbH
备用版本
Lecture notes in computer science,, 3225, Berlin, New York, Germany, 2004
备用版本
Springer Nature, Berlin, 2004
备用版本
1 edition, December 14, 2004
备用版本
Germany, Germany
元数据中的注释
Includes bibliographical references and index.
备用描述
Table of Contents
Key Management
Practical Authenticated Key Agreement Using Passwords
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks
Storage-Efficient Stateless Group Key Revocation
Digital Signatures
Low-Level Ideal Signatures and General Integrity Idealization
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA
How to Break and Repair a Universally Composable Signature Functionality
New Algorithms
RSA Accumulator Based Broadcast Encryption
Chameleon Hashing Without Key Exposure
Radix-r Non-Adjacent Form
Cryptanalysis
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor
Security Analysis of Two Signcryption Schemes
On The Security of Key Derivation Functions
Intrusion Detection
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Detection of Sniffers in an Ethernet Network
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
Securing DBMS: Characterizing and Detecting Query Floods
Access Control
An XML-Based Approach to Document Flow Verification
Model-Checking Access Control Policies
A Distributed High Assurance Reference Monitor
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control
Human Authentication
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security)
Image Recognition CAPTCHAs
Certificate Management
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
Certificate Recommendations to Improve the Robustness of Web of Trust
Mobile and Ad Hoc Security
Universally Composable Secure Mobile Agent Computation
Re-thinking Security in IP Based Micro-Mobility
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group
Web Security
Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions
Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps!
An Efficient Online Electronic Cash with Unlinkable Exact Payments
Digital Rights Management
Modifiable Digital Content Protection in P2P
Survey on the Technological Aspects of Digital Rights Management
Detecting Software Theft via Whole Program Path Birthmarks
Software Security
Effective Security Requirements Analysis: HAZOP and Use Cases
The Obfuscation Executive
Author Index
A
B
C
D
F
G
H
J
K
L
M
N
P
Q
R
S
T
W
X
Y
Z
备用描述
The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear’sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions,and wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative forum for their work. We were fortunate to have an energetic team of experts who took on the task of the program committee. Their names may be found overleaf, and we thank them warmly for their time and e?orts. This team was helped by an even larger number of external reviewers who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. We would also like to thank the advisory committee for their advice and s- port.TheexcellentlocalarrangementswerehandledbyDirkBalfanzandJessica Staddon. We made use of the electronic submission and reviewing software s- plied by COSIC at the Katholieke Universiteit Leuven. Both the software and the ISC 2004 website were run on a server at UNC Charlotte, and were perfectly maintained by Seung-Hyun Im. We also appreciate assistance from Lawrence Teo in editing the proceedings.
Erscheinungsdatum: 17.09.2004
备用描述
The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear'sconference. Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions, and wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative forum for their work. We were fortunate to have an energetic team of experts who took on the task of the program committee. Their names may be found overleaf, and we thank them warmly for their time and e?orts. This team was helped by an even larger number of external reviewers who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. We would also like to thank the advisory committee for their advice and s- port. TheexcellentlocalarrangementswerehandledbyDirkBalfanzandJessica Staddon. We made use of the electronic submission and reviewing software s- plied by COSIC at the Katholieke Universiteit Leuven. Both the software and the ISC 2004 website were run on a server at UNC Charlotte, and were perfectly maintained by Seung-Hyun Im. We also appreciate assistance from Lawrence Teo in editing the proceedings
开源日期
2024-07-22
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。