Skip to main content
  • Conference proceedings
  • © 2009

Advances in Information Security and Assurance

Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5576)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISA: International Conference on Information Security and Assurance

Conference proceedings info: ISA 2009.

Buying options

eBook USD 84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (85 papers)

  1. Front Matter

  2. Cryptographic Algorithms

    1. Update on SEED: SEED-192/256

      • Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park et al.
      Pages 1-10
    2. A New Double-Block-Length Hash Function Using Feistel Structure

      • Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park
      Pages 11-20
  3. Authentication and Identity Management

    1. The Dark Side of Timed Opacity

      • Franck Cassez
      Pages 21-30
    2. Certificateless Signature Scheme without Random Oracles

      • Yumin Yuan, Da Li, Liwen Tian, Haishan Zhu
      Pages 31-40
  4. Authorization and Access Control

    1. Grouping Provenance Information to Improve Efficiency of Access Control

      • Amril Syalim, Yoshiaki Hori, Kouichi Sakurai
      Pages 51-59
    2. Selective Regression Test for Access Control System Employing RBAC

      • Chao Huang, Jianling Sun, Xinyu Wang, Yuanjie Si
      Pages 70-79
    3. Formal Verification for Access Control in Web Information Sharing System

      • Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai
      Pages 80-89
  5. Biometrics and Computer Forensics

    1. Adaptive Iris Segmentation

      • Rahib Abiyev, Kemal Kilic
      Pages 90-99
    2. Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person

      • Hamidreza Rashidy Kanan, M. Shahram Moin
      Pages 100-109
    3. Methodology and Tools of IS Audit and Computer Forensics – The Common Denominator

      • Magdalena SzeżyÅ„ska, Ewa Huebner, Derek Bem, Chun Ruan
      Pages 110-121
  6. Cryptographic Protocols

    1. A New Strongly Secure Authenticated Key Exchange Protocol

      • Qingfeng Cheng, Chuangui Ma, Xuexian Hu
      Pages 135-144
    2. Improved Implementations of Cryptosystems Based on Tate Pairing

      • Chang-An Zhao, Dongqing Xie, Fangguo Zhang, Chong-Zhi Gao, Jingwei Zhang
      Pages 145-151
    3. Efficient Secure Multiparty Computation Protocol in Asynchronous Network

      • Zheng Huang, Weidong Qiu, Qiang Li, Kefei Chen
      Pages 152-158
  7. Data Integrity and Privacy

    1. Clustering-Based Frequency l-Diversity Anonymization

      • Mohammad-Reza Zare-Mirakabad, Aman Jantan, Stéphane Bressan
      Pages 159-168
    2. Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery

      • Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu
      Pages 169-178
    3. A Kademlia-Based Node Lookup System for Anonymization Networks

      • Benedikt Westermann, Andriy Panchenko, Lexi Pimenidis
      Pages 179-189

Other Volumes

  1. Advances in Information Security and Assurance

About this book

Welcome to the Third International Conference on Information Security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive conference focused on the various aspects of advances in information security and assurance. The concept of security and assurance is emerging rapidly as an exciting new paradigm to provide reliable and safe life services. Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. ISA 2009 was a succ- sor of the First International Workshop on Information Assurance in Networks (IAN 2007, Jeju-island, Korea, December, 2007), and the Second International Conference on Information Security and Assurance (ISA 2008, Busan, Korea, April 2008). The goal of this conference is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of information technology. ISA 2009 contained research papers submitted by researchers from all over the world. In order to guarantee high-quality proceedings, we put extensive effort into reviewing the papers. All submissions were peer reviewed by at least three Program Committee members as well as external reviewers. As the quality of the submissions was quite high, it was extremely difficult to select the papers for oral presentation and publication in the proceedings of the conference.

Keywords

  • authentication
  • cryptographic hardware
  • data security
  • e-health
  • fingerprint detection
  • firewall
  • identity management
  • key exchange
  • network security
  • privacy
  • radio-frequency identification (RFID)
  • sensor networks
  • ubiquitous computing
  • ubiquitous environments
  • wireless networks

Editors and Affiliations

  • Computer Engineering Department, Kyungnam University, Kyungnam, Korea

    Jong Hyuk Park

  • Institute of Communications Engineering, National Sun Yat-Sen University, Kaohsiung City, Taiwan

    Hsiao-Hwa Chen

  • School of Computer Science,, University of Oklahoma, Norman, USA

    Mohammed Atiquzzaman

  • School of Computer Engineering, Hanshin University, Kyeong-Gi, Korea

    Changhoon Lee

  • Division of Multimedia, Hannam University, Daejeon, Korea

    Tai-hoon Kim

  • Division of Computer Engineering, Mokwon University, Daejeon, Korea

    Sang-Soo Yeo

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions