Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues

11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers

Editors:

ISBN: 978-3-540-77504-1 (Print) 978-3-540-77505-8 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. ASIAN’2006

    1. No Access

      Book Chapter

      Pages 1-12

      Security Evaluation of a Type of Table-Network Implementation of Block Ciphers

    2. No Access

      Book Chapter

      Pages 13-27

      A Symbolic Intruder Model for Hash-Collision Attacks

    3. No Access

      Book Chapter

      Pages 28-36

      A Denotational Approach to Scope-Based Compensable Flow Language for Web Service

    4. No Access

      Book Chapter

      Pages 37-44

      Certificateless Authenticated Two-Party Key Agreement Protocols

    5. No Access

      Book Chapter

      Pages 45-59

      FORM : A Federated Rights Expression Model for Open DRM Frameworks

    6. No Access

      Book Chapter

      Pages 60-74

      A Method of Safety Analysis for Runtime Code Update

    7. No Access

      Book Chapter

      Pages 75-89

      Automata-Based Confidentiality Monitoring

    8. No Access

      Book Chapter

      Pages 90-104

      Efficient and Practical Control Flow Monitoring for Program Security

    9. No Access

      Book Chapter

      Pages 105-119

      Modular Formalization of Reactive Modules in COQ

    10. No Access

      Book Chapter

      Pages 120-135

      Closing Internal Timing Channels by Transformation

    11. No Access

      Book Chapter

      Pages 136-150

      Responsiveness in Process Calculi

    12. No Access

      Book Chapter

      Pages 151-166

      Normal Proofs in Intruder Theories

    13. No Access

      Book Chapter

      Pages 167-181

      Breaking and Fixing Public-Key Kerberos

    14. No Access

      Book Chapter

      Pages 182-196

      Computational Soundness of Formal Indistinguishability and Static Equivalence

    15. No Access

      Book Chapter

      Pages 197-213

      Secrecy Analysis in Protocol Composition Logic

    16. No Access

      Book Chapter

      Pages 214-222

      A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations

    17. No Access

      Book Chapter

      Pages 223-230

      On Completeness of Logical Relations for Monadic Types

    18. No Access

      Book Chapter

      Pages 231-239

      A Spatial Logical Characterisation of Context Bisimulation

    19. No Access

      Book Chapter

      Pages 240-247

      Information Hiding in the Join Calculus

    20. No Access

      Book Chapter

      Pages 248-255

      Modeling Urgency in Component-Based Real-Time Systems

previous Page of 2