Advances in Information Security and Assurance

Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

  • Jong Hyuk Park
  • Hsiao-Hwa Chen
  • Mohammed Atiquzzaman
  • Changhoon Lee
  • Tai-hoon Kim
  • Sang-Soo Yeo
Conference proceedings ISA 2009

DOI: 10.1007/978-3-642-02617-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5576)

Table of contents (85 papers)

  1. Front Matter
  2. Cryptographic Algorithms

    1. Update on SEED: SEED-192/256
      Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park et al.
      Pages 1-10
    2. A New Double-Block-Length Hash Function Using Feistel Structure
      Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park
      Pages 11-20
  3. Authentication and Identity Management

    1. The Dark Side of Timed Opacity
      Franck Cassez
      Pages 21-30
    2. Certificateless Signature Scheme without Random Oracles
      Yumin Yuan, Da Li, Liwen Tian, Haishan Zhu
      Pages 31-40
  4. Authorization and Access Control

    1. Grouping Provenance Information to Improve Efficiency of Access Control
      Amril Syalim, Yoshiaki Hori, Kouichi Sakurai
      Pages 51-59
    2. Selective Regression Test for Access Control System Employing RBAC
      Chao Huang, Jianling Sun, Xinyu Wang, Yuanjie Si
      Pages 70-79
    3. Formal Verification for Access Control in Web Information Sharing System
      Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai
      Pages 80-89
  5. Biometrics and Computer Forensics

    1. Adaptive Iris Segmentation
      Rahib Abiyev, Kemal Kilic
      Pages 90-99
    2. Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person
      Hamidreza Rashidy Kanan, M. Shahram Moin
      Pages 100-109
    3. Methodology and Tools of IS Audit and Computer Forensics – The Common Denominator
      Magdalena Szeżyńska, Ewa Huebner, Derek Bem, Chun Ruan
      Pages 110-121
  6. Cryptographic Protocols

    1. A New Strongly Secure Authenticated Key Exchange Protocol
      Qingfeng Cheng, Chuangui Ma, Xuexian Hu
      Pages 135-144
    2. Improved Implementations of Cryptosystems Based on Tate Pairing
      Chang-An Zhao, Dongqing Xie, Fangguo Zhang, Chong-Zhi Gao, Jingwei Zhang
      Pages 145-151
    3. Efficient Secure Multiparty Computation Protocol in Asynchronous Network
      Zheng Huang, Weidong Qiu, Qiang Li, Kefei Chen
      Pages 152-158
  7. Data Integrity and Privacy

    1. Clustering-Based Frequency l-Diversity Anonymization
      Mohammad-Reza Zare-Mirakabad, Aman Jantan, Stéphane Bressan
      Pages 159-168
    2. Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery
      Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu
      Pages 169-178
    3. A Kademlia-Based Node Lookup System for Anonymization Networks
      Benedikt Westermann, Andriy Panchenko, Lexi Pimenidis
      Pages 179-189

Other volumes

  1. Advances in Information Security and Its Application
    Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
  2. Advances in Information Security and Assurance
    Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009.

The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009.

Keywords

authentication cryptographic hardware data security e-health fingerprint detection firewall identity management key exchange network security privacy radio-frequency identification (RFID) sensor networks ubiquitous computing ubiquitous environments wireless networks

Editors and affiliations

  • Jong Hyuk Park
    • 1
  • Hsiao-Hwa Chen
    • 2
  • Mohammed Atiquzzaman
    • 3
  • Changhoon Lee
    • 4
  • Tai-hoon Kim
    • 5
  • Sang-Soo Yeo
    • 6
  1. 1.Computer Engineering DepartmentKyungnam UniversityKyungnamKorea
  2. 2.Institute of Communications EngineeringNational Sun Yat-Sen UniversityKaohsiung CityTaiwan
  3. 3.School of Computer Science,University of OklahomaNormanUSA
  4. 4.School of Computer EngineeringHanshin UniversityKyeong-GiKorea
  5. 5.Division of MultimediaHannam UniversityDaejeonKorea
  6. 6.Division of Computer EngineeringMokwon UniversityDaejeonKorea

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-02616-4
  • Online ISBN 978-3-642-02617-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349