Information Security Front Cover

Information Security

  • Length: 399 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2011-11-29
  • ISBN-10: 3642248608
  • ISBN-13: 9783642248603
  • Sales Rank: #18432905 (See Top 100 Books)
Description

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi’an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

Table of Contents

Chapter 1. Replacement Attacks on Behavior Based Software Birthmark
Chapter 2. Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders
Chapter 3. How to Find Short RC4 Colliding Key Pairs
Chapter 4. A Formal Approach to Distance-Bounding RFID Protocols
Chapter 5. MASHA – Low Cost Authentication with a New Stream Cipher
Chapter 6. Toward Pairing-Free Certificateless Authenticated Key Exchanges
Chapter 7. Security Analysis of an RSA Key Generation Algorithm with a Large Private Key
Chapter 8. Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption
Chapter 9. The n-Diffie-Hellman Problem and Its Applications
Chapter 10. RatBot: Anti-enumeration Peer-to-Peer Botnets
Chapter 11. Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
Chapter 12. Multi-stage Binary Code Obfuscation Using Improved Virtual Machine
Chapter 13. Detection and Analysis of Cryptographic Data Inside Software
Chapter 14. SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms
Chapter 15. Hello rootKitty: A Lightweight Invariance-Enforcing Framework
Chapter 16. Opacity Analysis in Trust Management Systems
Chapter 17. On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints
Chapter 18. Round-Efficient Oblivious Database Manipulation
Chapter 19. A Privacy-Preserving Join on Outsourced Database
Chapter 20. APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks
Chapter 21. Assessing Location Privacy in Mobile Communication Networks
Chapter 22. How Much Is Enough? Choosing $\epsilon$ for Differential Privacy
Chapter 23. Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security
Chapter 24. An Efficient Construction of Time-Selective Convertible Undeniable Signatures
Chapter 25. Efficient Fail-Stop Signatures from the Factoring Assumption

To access the link, solve the captcha.