Advances in Information and Computer Security

First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings

  • Hiroshi Yoshiura
  • Kouichi Sakurai
  • Kai Rannenberg
  • Yuko Murayama
  • Shinichi Kawamura
Conference proceedings IWSEC 2006

DOI: 10.1007/11908739

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4266)

Table of contents (30 papers)

  1. Front Matter
  2. Signatures (1)

    1. ID-Based Ring Signature Scheme Secure in the Standard Model
      Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
      Pages 1-16
  3. Security Evaluation

    1. A Model-Based Method for Security Configuration Verification
      Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa
      Pages 60-75
    2. Personal Computer Privacy: Analysis for Korean PC Users
      Young Chul Kwon, Sang Won Lee, Songchun Moon
      Pages 76-87
  4. Signatures (2)

    1. Short Traceable Signatures Based on Bilinear Pairings
      Seung Geol Choi, Kunsoo Park, Moti Yung
      Pages 88-103
    2. Ring Signature with Designated Linkability
      Joseph K. Liu, Willy Susilo, Duncan S. Wong
      Pages 104-119
    3. Ad Hoc Group Signatures
      Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
      Pages 120-135
    4. Rateless Codes for the Multicast Stream Authentication Problem
      Christophe Tartary, Huaxiong Wang
      Pages 136-151
  5. Authentication

    1. Crossing Borders: Security and Privacy Issues of the European e-Passport
      Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur
      Pages 152-167
    2. A New Approach to Hide Policy for Automated Trust Negotiation
      Hai Jin, Zhensong Liao, Deqing Zou, Weizhong Qiang
      Pages 168-178
    3. Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing
      Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu
      Pages 179-195
    4. IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures
      James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry
      Pages 196-211
  6. Security for Multimedia

    1. Real-Time Watermark Embedding for High Resolution Video Watermarking
      In-Koo Kang, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee
      Pages 227-238
    2. Inhibiting Card Sharing Attacks
      Michael Tunstall, Konstantinos Markantonakis, Keith Mayes
      Pages 239-251
  7. Network Security

    1. Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks
      Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim
      Pages 268-277

About these proceedings


ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop was our ?rst trial in that two major academic society groups on security in Japan, viz. ISEC and CSEC, jointly organized it; ISEC is a te- nical group on information security of the Institute of Electronics, Information and Communication Engineers (IEICE), and CSEC is a special interest group on computer security of the Information Processing Society of Japan (IPSJ). It was Ryoichi Sasaki, the former head of CSEC, who proposed holding such an international workshop in Japan for the ?rst time, two years ago. The two groups supported his idea and started organizing the workshop. CSEC has its annual domestic symposium, the Computer Security Symposium (CSS), in - tober for three days, and we decided to organize the workshop prior to CSS this year. The initial aim of the workshop was primarily to provide young researchers with the opportunity to present their work in English. However, due to more submissions than we had anticipated, the quality of the accepted papers became far better than we had expected. Theconferencereceived147submissions,outofwhichtheprogramcommittee selected 30 for presentation. These proceedings contain the ?nal versions of the accepted papers, which the authors ?nalized on the basis of comments from the reviewers. Since these revisions were not subject to editorial review, the authors bear full responsibility for the contents of their papers.


Denial of Service DoS attacks Information Linux Symbol algorithms authentication identity information security intrusion detection public key encryption security security evaluation trust verification

Editors and affiliations

  • Hiroshi Yoshiura
    • 1
  • Kouichi Sakurai
    • 2
  • Kai Rannenberg
    • 3
  • Yuko Murayama
    • 4
  • Shinichi Kawamura
    • 5
  1. 1.Faculty of Electro-CommunicationThe University of Electro-CommunicationsChofuJapan
  2. 2.Department of Computer Science, Communication EngineeringKyushu UniversityFukuokaJapan
  3. 3.Institute of Business InformaticsGoethe University FrankfurtFrankfurt/MainGermany
  4. 4.Faculty of Software and Information ScienceIwate Prefectural UniversityIwateJapan
  5. 5.Toshiba CorporationKawasakiJapan

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-47699-3
  • Online ISBN 978-3-540-47700-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349