Emerging Challenges for Security, Privacy and Trust

24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings

  • Dimitris Gritzalis
  • Javier Lopez
Conference proceedings SEC 2009

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 297)

Table of contents

  1. Front Matter
  2. Identification and Authentication I

    1. Nathan Clarke, Sevasti Karatzouni, Steven Furnell
      Pages 1-12
    2. Yannis Soupionis, George Tountas, Dimitris Gritzalis
      Pages 25-38
  3. Threats and Attacks

    1. Lucas Nussbaum, Pierre Neyron, Olivier Richard
      Pages 51-62
    2. Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar Iyer
      Pages 63-75
  4. Identification and Authentication II

    1. Gerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl
      Pages 76-86
    2. Marcel Fernandez, Josep Cotrina, Miguel Soriano, Neus Domingo
      Pages 87-97
    3. Li Yao, Ning Zhang
      Pages 98-108
  5. Applications of Cryptography and Information Hiding

    1. Herbert Leitold, Reinhard Posch, Thomas Rössler
      Pages 109-118
    2. Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
      Pages 119-131
    3. Jorge Blasco, Julio C. Hernandez-Castro, Juan M. E. Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros
      Pages 132-142
  6. Trusted Computing

    1. Shay Gueron, Jean-Pierre Seifert
      Pages 143-151
    2. Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt
      Pages 152-163
  7. Security Policies

    1. Anas Abou El Kalam, Philippe Balbiani
      Pages 176-189
  8. Validation, Verification, Evaluation

    1. Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph
      Pages 190-201
    2. Puneet Gupta, Scott D. Stoller
      Pages 202-213
    3. Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag
      Pages 214-225

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009,  held in Pafos, Cyprus, in May 2009.

The 38 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers are organized in topical sections on identification and authentication, threats and attacks, applications of cryptography and information hiding, trusted computing, security policies, validation, verification and evaluation, privacy protection and security assessment, role mining and content protection, security protocols, access control, and internet and Web applications security.

Keywords

Trusted Computing ad-hoc networks botnet protocols cryptanalysis data security egovernment encryption esignatures information intrusion detection iris recognition mobile networking privacy steganalysis voip

Editors and affiliations

  • Dimitris Gritzalis
    • 1
  • Javier Lopez
    • 2
  1. 1.Information Security and Infrastructure Protection Research Group, Dept. of InformaticsAthens University of Economics and BusinessAthensGreece
  2. 2.Computer Science Department, E.T.S.I. InformaticaUniversity of MalagaMalagaSpain

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-01244-0
  • Copyright Information IFIP International Federation for Information Processing 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01243-3
  • Online ISBN 978-3-642-01244-0
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • About this book