Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings /

Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings / Juan A. Garay [and others] (eds.). - Berlin ; New York : Springer, 2007. - 1 online resource (xiii, 436 pages) : illustrations - Lecture notes in computer science, 4779 0302-9743 ; LNCS sublibrary. SL 4, Security and cryptology Serienbezeichnung . - Lecture notes in computer science ; 4779. LNCS sublibrary. SL 4, Security and cryptology. .

Includes bibliographical references and index.

Intrusion Detection -- Detecting System Emulators -- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems -- E-NIPS: An Event-Based Network Intrusion Prediction System -- Digital Rights Management -- Enabling Fairer Digital Rights Management with Trusted Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security of Elastic Block Ciphers Against Key-Recovery Attacks -- Impossible-Differential Attacks on Large-Block Rijndael -- High-Speed Pipelined Hardware Architecture for Galois Counter Mode -- Cryptographic Protocols and Schemes -- Efficient Committed Oblivious Transfer of Bit Strings -- An Efficient Certified Email Protocol -- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability -- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures -- Identify-Based Cryptography -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension -- Cryptanalysis -- Small Private-Exponent Attack on RSA with Primes Sharing Bits -- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 -- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as a DoS Counter-Measure? -- Software Obfuscation -- On the Concept of Software Obfuscation in Computer Security -- Specifying Imperative Data Obfuscations -- Public-Key Cryptosystems -- Token-Controlled Public Key Encryption in the Standard Model -- Trapdoor Permutation Polynomials of?/n? and Public Key Cryptosystems -- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring -- Towards a DL-Based Additively Homomorphic Encryption Scheme -- Elliptic Curves and Applications -- Differential Properties of Elliptic Curves and Blind Signatures -- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation -- Database Security and Privacy -- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control -- Efficient Negative Databases from Cryptographic Hash Functions.

This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007. The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases.

9783540754961 3540754962 9783540754954 3540754954 1281354503 9781281354501

10.1007/978-3-540-75496-1 doi

12170333

978-3-540-75495-4 Springer http://www.springerlink.com

2007936070

07,N39,0032 dnb

985542144 DE-101 986506052 DE-101


Computer security--Congresses.
Computers--Access control--Congresses.
Computers--Access control.
Computer security.
Informatique.
Computer security.
Computers--Access control.
Redes e comunicação de dados (congressos)
Segurança (congressos)

algoritmen algorithms computeranalyse computer analysis systemen systems computerwetenschappen computer sciences computernetwerken computer networks gegevensbeheer data management operating systems Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen)


Electronic books.
Electronic books.
Conference papers and proceedings.

QA76.9.A25 / I85 2007eb

005.8

Powered by Koha