Skip to main content
  • Conference proceedings
  • © 2005

Information Security

8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3650)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

  2. Network Security I

    1. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks

      • Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis
      Pages 1-15
    2. SVision: A Network Host-Centered Anomaly Visualization Technique

      • Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
      Pages 16-28
  3. Trust & Privacy

    1. Time-Based Release of Confidential Information in Hierarchical Settings

      • Deholo Nali, Carlisle Adams, Ali Miri
      Pages 29-43
    2. “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience

      • Elisavet Konstantinou, Vasiliki Liagkou, Paul Spirakis, Yannis C. Stamatiou, Moti Yung
      Pages 44-58
    3. A Privacy Preserving Rental System

      • Yanjiang Yang, Beng Chin Ooi
      Pages 59-73
  4. Key Management & Protocols

    1. Constant Round Dynamic Group Key Agreement

      • Ratna Dutta, Rana Barua
      Pages 74-88
    2. ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms

      • Hyung Mok Lee, Kyung Ju Ha, Kyo Min Ku
      Pages 104-117
    3. On the Notion of Statistical Security in Simulatability Definitions

      • Dennis Hofheinz, Dominique Unruh
      Pages 118-133
  5. Public Key Encryption & Signature

    1. Certificateless Public Key Encryption Without Pairing

      • Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
      Pages 134-148
    2. Tracing-by-Linking Group Signatures

      • Victor K. Wei
      Pages 149-163
    3. Chaum’s Designated Confirmer Signature Revisited

      • Jean Monnerat, Serge Vaudenay
      Pages 164-178
  6. Network Security II

    1. gore: Routing-Assisted Defense Against DDoS Attacks

      • Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis
      Pages 179-193
    2. IPSec Support in NAT-PT Scenario for IPv6 Transition

      • Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim
      Pages 194-202
  7. Signcryption

    1. Hybrid Signcryption Schemes with Outsider Security

      • Alexander W. Dent
      Pages 203-217
    2. Analysis and Improvement of a Signcryption Scheme with Key Privacy

      • Guomin Yang, Duncan S. Wong, Xiaotie Deng
      Pages 218-232
    3. Efficient and Proactive Threshold Signcryption

      • Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
      Pages 233-243
  8. Crypto Algorithm & Analysis

Other Volumes

  1. Information Security

About this book

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before — only 33 regular papers were accepted, plus 5 student papers for a special student session.

Editors and Affiliations

  • Cryptography and Security Department Institute for Infocomm Research, Singapore

    Jianying Zhou

  • Department of Information and Communication Technologies, University of A Coruña, Spain

    Javier Lopez

  • School of Information Systems, Singapore Management University, Singapore

    Robert H. Deng

  • Institute for Infocomm Research, Singapore

    Feng Bao

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access