Advances in Information and Computer Security

Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

  • Kanta Matsuura
  • Eiichiro Fujisaki
Conference proceedings IWSEC 2008
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5312)

Table of contents

  1. Front Matter
  2. Cryptography

    1. Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe
      Pages 20-33
    2. Naoki Ogura, Shigenori Uchiyama
      Pages 34-48
  3. Signature and Signcryption

  4. Software Security

    1. Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei (Nick) Saw, Ramarathnam Venkatesan
      Pages 100-120
    2. Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han
      Pages 121-135
    3. Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis
      Pages 136-151
    4. Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 152-166
  5. Privacy Protection and Contents Protection

    1. Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen
      Pages 167-183
    2. Cyril Bazin, Jean-Marie Le Bars, Jacques Madelaine
      Pages 201-217
  6. Invited Talk

  7. Authentication and Access Control

    1. Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer
      Pages 219-230
    2. Dong Chan An, So Mi Park, Seog Park
      Pages 246-260
  8. Implementation

    1. Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda
      Pages 261-278
    2. Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
      Pages 279-297

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008.

The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on cryptography, signature and signcryption, software security, privacy protection and contents protection, authentication and access control, as well as implementation.

Keywords

access control anomaly detection authentication behavior profiling biometric data certification computer security cryptanalysis cryptographic protocols data security dynamic XML group signature information leakage information s security

Editors and affiliations

  • Kanta Matsuura
    • 1
  • Eiichiro Fujisaki
    • 2
  1. 1.Institute of Industrial ScienceUniversity of TokyoTokyoJapan
  2. 2.NTT Information Sharing Platform LaboratoriesNTT CorporationJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-89598-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-89597-8
  • Online ISBN 978-3-540-89598-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book