Information Security Practice and Experience

4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

  • Editors
  • Liqun Chen
  • Yi Mu
  • Willy Susilo
Conference proceedings ISPEC 2008

DOI: 10.1007/978-3-540-79104-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4991)

Table of contents (29 papers)

  1. Front Matter
  2. An On-Line Secure E-Passport Protocol
    Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang
    Pages 14-28
  3. Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly
    Frederik Armknecht, Alberto N. Escalante B., Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
    Pages 29-44
  4. 1-out-of-n Oblivious Signatures
    Raylin Tso, Takeshi Okamoto, Eiji Okamoto
    Pages 45-55
  5. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes
    Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval
    Pages 56-70
  6. Private Query on Encrypted Data in Multi-user Settings
    Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang
    Pages 71-85
  7. Towards Tamper Resistant Code Encryption: Practice and Experience
    Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere
    Pages 86-100
  8. Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs
    Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma
    Pages 131-145
  9. Secure Cryptographic Precomputation with Insecure Memory
    Patrick P. Tsang, Sean W. Smith
    Pages 146-160
  10. Securing Peer-to-Peer Distributions for Mobile Devices
    André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan
    Pages 161-175
  11. Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks
    Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim
    Pages 176-187
  12. Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers
    Patrick P. Tsang, Sean W. Smith
    Pages 188-202
  13. PROBE: A Process Behavior-Based Host Intrusion Prevention System
    Minjin Kwon, Kyoochang Jeong, Heejo Lee
    Pages 203-217
  14. Towards the World-Wide Quantum Network
    Quoc-Cuong Le, Patrick Bellot, Akim Demaille
    Pages 218-232
  15. Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains
    Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu
    Pages 248-262
  16. Privacy of Recent RFID Authentication Protocols
    Khaled Ouafi, Raphael C. -W. Phan
    Pages 263-277

About these proceedings


Code Denial of Service Distributed Denial of Service RSA Radio-Frequency Identification (RFID) access control algorithms data security elliptic curves finite field arithmetic hardware security information security intrusion det privacy trust

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-79103-4
  • Online ISBN 978-3-540-79104-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349