Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues

11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers

  • Editors
  • Mitsu Okada
  • Ichiro Satoh
Conference proceedings ASIAN 2006

DOI: 10.1007/978-3-540-77505-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4435)

Table of contents (27 papers)

  1. Front Matter
  2. ASIAN’2006

    1. A Symbolic Intruder Model for Hash-Collision Attacks
      Yannick Chevalier, Mounira Kourjieh
      Pages 13-27
    2. Certificateless Authenticated Two-Party Key Agreement Protocols
      Tarjei K. Mandt, Chik How Tan
      Pages 37-44
    3. FORM : A Federated Rights Expression Model for Open DRM Frameworks
      Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia
      Pages 45-59
    4. Automata-Based Confidentiality Monitoring
      Gurvan Le Guernic, Anindya Banerjee, Thomas Jensen, David A. Schmidt
      Pages 75-89
    5. Efficient and Practical Control Flow Monitoring for Program Security
      Nai Xia, Bing Mao, Qingkai Zeng, Li Xie
      Pages 90-104
    6. Modular Formalization of Reactive Modules in COQ
      Ming-Hsien Tsai, Bow-Yaw Wang
      Pages 105-119
    7. Closing Internal Timing Channels by Transformation
      Alejandro Russo, John Hughes, David Naumann, Andrei Sabelfeld
      Pages 120-135
    8. Responsiveness in Process Calculi
      Lucia Acciai, Michele Boreale
      Pages 136-150
    9. Normal Proofs in Intruder Theories
      Vincent Bernat, Hubert Comon-Lundh
      Pages 151-166
    10. Breaking and Fixing Public-Key Kerberos
      Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad
      Pages 167-181
    11. Computational Soundness of Formal Indistinguishability and Static Equivalence
      Gergei Bana, Payman Mohassel, Till Stegers
      Pages 182-196
    12. Secrecy Analysis in Protocol Composition Logic
      Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert
      Pages 197-213
    13. On Completeness of Logical Relations for Monadic Types
      Sławomir Lasota, David Nowak, Yu Zhang
      Pages 223-230
    14. Information Hiding in the Join Calculus
      Qin Ma, Luc Maranget
      Pages 240-247

About these proceedings


DRM Symbol XML authentication automata bilinear map component software control flow database dynamic profiling formal reasoning formal verification real-time systems semantics verification

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-77504-1
  • Online ISBN 978-3-540-77505-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349