Advances in Information and Computer Security

Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

  • Kanta Matsuura
  • Eiichiro Fujisaki
Conference proceedings IWSEC 2008

DOI: 10.1007/978-3-540-89598-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5312)

Table of contents (19 papers)

  1. Front Matter
  2. Cryptography

    1. Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
      Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe
      Pages 20-33
    2. Remarks on the Attack of Fouque et al. against the ℓIC Scheme
      Naoki Ogura, Shigenori Uchiyama
      Pages 34-48
  3. Signature and Signcryption

  4. Software Security

    1. The Superdiversifier: Peephole Individualization for Software Protection
      Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei (Nick) Saw, Ramarathnam Venkatesan
      Pages 100-120
    2. Detecting Java Theft Based on Static API Trace Birthmark
      Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han
      Pages 121-135
    3. Online Network Forensics for Automatic Repair Validation
      Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis
      Pages 136-151
    4. Return Value Predictability Profiles for Self–healing
      Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 152-166
  5. Privacy Protection and Contents Protection

    1. Involuntary Information Leakage in Social Network Services
      Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen
      Pages 167-183
    2. A Novel Framework for Watermarking: The Data-Abstracted Approach
      Cyril Bazin, Jean-Marie Le Bars, Jacques Madelaine
      Pages 201-217
  6. Invited Talk

  7. Authentication and Access Control

    1. An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
      Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer
      Pages 219-230
    2. Efficient Secure Labeling Method under Dynamic XML Data Streams
      Dong Chan An, So Mi Park, Seog Park
      Pages 246-260
  8. Implementation

    1. Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems
      Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda
      Pages 261-278
    2. The Long-Short-Key Primitive and Its Applications to Key Security
      Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
      Pages 279-297

About these proceedings


This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008.

The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on cryptography, signature and signcryption, software security, privacy protection and contents protection, authentication and access control, as well as implementation.


access control anomaly detection authentication behavior profiling biometric data certification computer security cryptanalysis cryptographic protocols data security dynamic XML group signature information leakage information s security

Editors and affiliations

  • Kanta Matsuura
    • 1
  • Eiichiro Fujisaki
    • 2
  1. 1.Institute of Industrial ScienceUniversity of TokyoTokyoJapan
  2. 2.NTT Information Sharing Platform LaboratoriesNTT CorporationJapan

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-89597-8
  • Online ISBN 978-3-540-89598-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349