Book Volume 3650 2005

Information Security

8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings

Editors:

ISBN: 978-3-540-29001-8 (Print) 978-3-540-31930-6 (Online)

Table of contents (38 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Network Security I

    1. No Access

      Chapter

      Pages 1-15

      A Dynamic Mechanism for Recovering from Buffer Overflow Attacks

    2. No Access

      Chapter

      Pages 16-28

      SVision: A Network Host-Centered Anomaly Visualization Technique

  3. Trust & Privacy

    1. No Access

      Chapter

      Pages 29-43

      Time-Based Release of Confidential Information in Hierarchical Settings

    2. No Access

      Chapter

      Pages 44-58

      “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience

    3. No Access

      Chapter

      Pages 59-73

      A Privacy Preserving Rental System

  4. Key Management & Protocols

    1. No Access

      Chapter

      Pages 74-88

      Constant Round Dynamic Group Key Agreement

    2. No Access

      Chapter

      Pages 89-103

      A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design

    3. No Access

      Chapter

      Pages 104-117

      ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms

    4. No Access

      Chapter

      Pages 118-133

      On the Notion of Statistical Security in Simulatability Definitions

  5. Public Key Encryption & Signature

    1. No Access

      Chapter

      Pages 134-148

      Certificateless Public Key Encryption Without Pairing

    2. No Access

      Chapter

      Pages 149-163

      Tracing-by-Linking Group Signatures

    3. No Access

      Chapter

      Pages 164-178

      Chaum’s Designated Confirmer Signature Revisited

  6. Network Security II

    1. No Access

      Chapter

      Pages 179-193

      gore: Routing-Assisted Defense Against DDoS Attacks

    2. No Access

      Chapter

      Pages 194-202

      IPSec Support in NAT-PT Scenario for IPv6 Transition

  7. Signcryption

    1. No Access

      Chapter

      Pages 203-217

      Hybrid Signcryption Schemes with Outsider Security

    2. No Access

      Chapter

      Pages 218-232

      Analysis and Improvement of a Signcryption Scheme with Key Privacy

    3. No Access

      Chapter

      Pages 233-243

      Efficient and Proactive Threshold Signcryption

  8. Crypto Algorithm & Analysis

    1. No Access

      Chapter

      Pages 244-258

      Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    2. No Access

      Chapter

      Pages 259-273

      Hardware Architecture and Cost Estimates for Breaking SHA-1

    3. No Access

      Chapter

      Pages 274-287

      On the Security of Tweakable Modes of Operation: TBC and TAE

previous Page of 2