Information Security

12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings

  • Pierangela Samarati
  • Moti Yung
  • Fabio Martinelli
  • Claudio A. Ardagna
Conference proceedings ISC 2009

DOI: 10.1007/978-3-642-04474-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5735)

Table of contents (38 papers)

  1. Front Matter
  2. Analysis Techniques

    1. A New Approach to χ2 Cryptanalysis of Block Ciphers
      Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel
      Pages 1-16
    2. Analysis and Optimization of Cryptographically Generated Addresses
      Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
      Pages 17-32
    3. Security Analysis of the PACE Key-Agreement Protocol
      Jens Bender, Marc Fischlin, Dennis Kügler
      Pages 33-48
    4. Towards Security Notions for White-Box Cryptography
      Amitabh Saxena, Brecht Wyseur, Bart Preneel
      Pages 49-58
    5. A Calculus to Detect Guessing Attacks
      Bogdan Groza, Marius Minea
      Pages 59-67
  3. Hash Functions

  4. Database Security and Biometrics

    1. Detection of Database Intrusion Using a Two-Stage Fuzzy System
      Suvasini Panigrahi, Shamik Sural
      Pages 107-120
    2. Cancelable Iris Biometrics Using Block Re-mapping and Image Warping
      Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl
      Pages 135-142
    3. Iris Recognition in Nonideal Situations
      Kaushik Roy, Prabir Bhattacharya
      Pages 143-150
  5. Algebraic Attacks and Proxy Re-Encryption

    1. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
      Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao
      Pages 151-166
    2. Practical Algebraic Attacks on the Hitag2 Stream Cipher
      Nicolas T. Courtois, Sean O’Neil, Jean-Jacques Quisquater
      Pages 167-176
    3. A New Construction of Boolean Functions with Maximum Algebraic Immunity
      Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li
      Pages 177-185
  6. Distributed System Security

    1. A2M: Access-Assured Mobile Desktop Computing
      Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh
      Pages 186-201
    2. Automated Spyware Collection and Analysis
      Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda
      Pages 202-217
    3. Towards Unifying Vulnerability Information for Attack Graph Construction
      Sebastian Roschke, Feng Cheng, Robert Schuppenies, Christoph Meinel
      Pages 218-233
    4. Traitor Tracing without A Priori Bound on the Coalition Size
      Hongxia Jin, Serdar Pehlivanoglu
      Pages 234-241

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.

The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.

Keywords

access control algebraic attacks anonymity applied cryptography authentication behavior-based detection biometrics block ciphers boolean function collision attacks cryptographic algorithms cryptographic pr cryptography distributed systems hash function

Editors and affiliations

  • Pierangela Samarati
    • 1
  • Moti Yung
    • 2
  • Fabio Martinelli
    • 3
  • Claudio A. Ardagna
    • 4
  1. 1.Dipartimento di Tecnologie dell’ InformazioneUniversità degli Studi di MilanoCremaItaly
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA
  3. 3.Information Security Group, Pisa Research AreaIstituto di Informatica e Telematica - IIT Consiglio Nazionale delle Ricerche - C.N.R.PisaItaly
  4. 4.Dipartimento di Tecnologie dell’InformazioneUniversità degli Studi di MilanoCremaItaly

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04473-1
  • Online ISBN 978-3-642-04474-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349