Information Security

Information Security Front Cover
1 Reviews
399 pages

Book Description

This book constitutes the refereed proceedings of the 14th International Conference on Information , ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network ; software ; system ; security; privacy; digital signatures.

Table of Contents

Chapter 1. Replacement Attacks on Based Software Birthmark
Chapter 2. Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders
Chapter 3. How to Find Short RC4 Colliding Key Pairs
Chapter 4. A Formal Approach to Distance-Bounding RFID Protocols
Chapter 5. MASHA – Low Cost Authentication with a New Stream Cipher
Chapter 6. Toward Pairing-Free Certificateless Authenticated Key Exchanges
Chapter 7. Security Analysis of an RSA Key Generation Algorithm with a Large Private Key
Chapter 8. Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption
Chapter 9. The n-Diffie-Hellman Problem and Its Applications
Chapter 10. RatBot: Anti-enumeration Peer-to-Peer Botnets
Chapter 11. Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
Chapter 12. Multi-stage Binary Code Obfuscation Using Improved Virtual Machine
Chapter 13. Detection and Analysis of Cryptographic Data Inside Software
Chapter 14. SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms
Chapter 15. Hello rootKitty: A Lightweight Invariance-Enforcing Framework
Chapter 16. Opacity Analysis in Trust Systems
Chapter 17. On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints
Chapter 18. Round-Efficient Oblivious Database Manipulation
Chapter 19. A Privacy-Preserving Join on Outsourced Database
Chapter 20. APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc
Chapter 21. Assessing Location Privacy in Mobile Communication Networks
Chapter 22. How Much Is Enough? Choosing $\epsilon$ for Differential Privacy
Chapter 23. Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security
Chapter 24. An Efficient of Time-Selective Convertible Undeniable Signatures
Chapter 25. Efficient Fail-Stop Signatures from the Factoring Assumption

Book Details

  • Title: Information Security
  • Length: 399 pages
  • Edition: 1
  • Language: English
  • Publisher:
  • Publication Date: 2011-11-29
  • ISBN-10: 3642248608
  • ISBN-13: 9783642248603