Skip to main content
  • Conference proceedings
  • © 2004

Information Security

7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3225)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2004.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (36 papers)

  1. Front Matter

  2. Digital Signatures

    1. Low-Level Ideal Signatures and General Integrity Idealization

      • Michael Backes, Birgit Pfitzmann, Michael Waidner
      Pages 39-51
    2. Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA

      • Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
      Pages 52-60
  3. New Algorithms

    1. RSA Accumulator Based Broadcast Encryption

      • Craig Gentry, Zulfikar Ramzan
      Pages 73-86
    2. Chameleon Hashing Without Key Exposure

      • Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
      Pages 87-98
    3. Radix-r Non-Adjacent Form

      • Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu
      Pages 99-110
  4. Cryptanalysis

    1. On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor

      • Raphael C. -W. Phan, Helena Handschuh
      Pages 111-122
    2. Security Analysis of Two Signcryption Schemes

      • Guilin Wang, Robert H. Deng, DongJin Kwak, SangJae Moon
      Pages 123-133
    3. On The Security of Key Derivation Functions

      • Carlisle Adams, Guenther Kramer, Serge Mister, Robert Zuccherato
      Pages 134-145
  5. Intrusion Detection

    1. Detection of Sniffers in an Ethernet Network

      • Zouheir Trabelsi, Hamza Rahmani
      Pages 170-182
    2. Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks

      • Mark Foster, Joseph N. Wilson, Shigang Chen
      Pages 183-194
    3. Securing DBMS: Characterizing and Detecting Query Floods

      • Elisa Bertino, Teodoro Leggieri, Evimaria Terzi
      Pages 195-206
  6. Access Control

    1. An XML-Based Approach to Document Flow Verification

      • Elisa Bertino, Elena Ferrari, Giovanni Mella
      Pages 207-218
    2. Model-Checking Access Control Policies

      • Dimitar P. Guelev, Mark Ryan, Pierre Yves Schobbens
      Pages 219-230

Other Volumes

  1. Information Security

About this book

The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear’sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions,and wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative forum for their work. We were fortunate to have an energetic team of experts who took on the task of the program committee. Their names may be found overleaf, and we thank them warmly for their time and e?orts. This team was helped by an even larger number of external reviewers who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. We would also like to thank the advisory committee for their advice and s- port.TheexcellentlocalarrangementswerehandledbyDirkBalfanzandJessica Staddon. We made use of the electronic submission and reviewing software s- plied by COSIC at the Katholieke Universiteit Leuven. Both the software and the ISC 2004 website were run on a server at UNC Charlotte, and were perfectly maintained by Seung-Hyun Im. We also appreciate assistance from Lawrence Teo in editing the proceedings.

Keywords

  • Information
  • RSA
  • Smart Card
  • algorithms
  • anonymity
  • data security
  • digital payment
  • digital signature schemes
  • network security
  • person authentication
  • privacy
  • secure communications
  • security
  • systems security
  • trust
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Institute of psychology, Chinese Academy of Sciences, Beijing, P.R. China

    Kan Zhang

  • Department of Software & Information Systems, The University of North Carolina at Charlotte, Charlotte, USA

    Yuliang Zheng

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions