Skip to main content
  • Conference proceedings
  • © 2007

Information Security

10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4779)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Intrusion Detection

    1. Detecting System Emulators

      • Thomas Raffetseder, Christopher Kruegel, Engin Kirda
      Pages 1-18
    2. E-NIPS: An Event-Based Network Intrusion Prediction System

      • Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque
      Pages 37-52
  3. Digital Rights Management

    1. Enabling Fairer Digital Rights Management with Trusted Computing

      • Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg
      Pages 53-70
    2. Traitor Tracing with Optimal Transmission Rate

      • Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
      Pages 71-88
  4. Symmetric-Key Cryptography

    1. The Security of Elastic Block Ciphers Against Key-Recovery Attacks

      • Debra L. Cook, Moti Yung, Angelos D. Keromytis
      Pages 89-103
    2. Impossible-Differential Attacks on Large-Block Rijndael

      • Jorge Nakahara Jr., Ivan Carlos Pavão
      Pages 104-117
    3. High-Speed Pipelined Hardware Architecture for Galois Counter Mode

      • Akashi Satoh, Takeshi Sugawara, Takafumi Aoki
      Pages 118-129
  5. Cryptographic Protocols and Schemes

    1. Efficient Committed Oblivious Transfer of Bit Strings

      • Mehmet S. Kiraz, Berry Schoenmakers, José Villegas
      Pages 130-144
    2. An Efficient Certified Email Protocol

      • Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao
      Pages 145-157
  6. Identify-Based Cryptography

    1. Identity-Based Proxy Re-encryption Without Random Oracles

      • Cheng-Kang Chu, Wen-Guey Tzeng
      Pages 189-202
    2. Strongly-Secure Identity-Based Key Agreement and Anonymous Extension

      • Sherman S. M. Chow, Kim-Kwang Raymond Choo
      Pages 203-220
  7. Cryptanalysis

    1. Small Private-Exponent Attack on RSA with Primes Sharing Bits

      • Yao-Dong Zhao, Wen-Feng Qi
      Pages 221-229
    2. Multiple Modular Additions and Crossword Puzzle Attack on NLSv2

      • Joo Yeon Cho, Josef Pieprzyk
      Pages 230-248
    3. New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py

      • Gautham Sekar, Souradyuti Paul, Bart Preneel
      Pages 249-262
  8. Network Security

    1. Queue Management as a DoS Counter-Measure?

      • Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins
      Pages 263-280
  9. Software Obfuscation

    1. On the Concept of Software Obfuscation in Computer Security

      • Nikolay Kuzurin, Alexander Shokurov, Nikolay Varnovsky, Vladimir Zakharov
      Pages 281-298

Other Volumes

  1. Information Security

About this book

The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual international conference covering research in theory and applications of information security, aiming to attract high quality papers in all of its technical aspects. ISC was ?rst initiated as a workshop (ISW) in Japan in 1997, ISW 1999 was held in Malaysia and ISW 2000 in Australia. The name was changed to the current one when the conf- ence was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), the UK (ISC 2003), the USA (ISC 2004), Singapore (ISC 2005),and Greece (ISC 2006). This year the event wassponsored by the Univ- sidad T´ ecnica Federico Santa Mar´ ?a (Valpara´ ?so, Chile), the Support Center for AdvancedTelecommunicationsTechnologyResearch,Foundation,SCAT(Tokyo, Japan), Microsoft Corporation, and Yahoo! Research. Re?ectingtheconference’sbroadscope,thisyear’smainProgramCommittee consisted of a relatively large number (49) of experts. Additionally, given the timely topic of cryptanalysis and design of hash functions and the NIST hash competition, the conference also featured a special Hash Subcommittee, chaired by Arjen Lenstra (EPFL and Bell Labs), as well as a panel on hashing, chaired by Bill Burr (NIST). The conference received 116 submissions, 29 of which were selected by the committee members for presentation at the conference, based on quality, originality and relevance. Each paper was anonymously reviewed by at least three committee members.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access