Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, 2008, Proceedings (Lecture Notes in Computer Science) 〈Vol. 5222〉

個数:

Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, 2008, Proceedings (Lecture Notes in Computer Science) 〈Vol. 5222〉

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 504 p.
  • 言語 ENG
  • 商品コード 9783540858843
  • DDC分類 003

Full Description

The 11th Information Security Conference (ISC 2008) was held in Taipei, T- wan, September 15-18,2008. ISC is an annual international conference covering researchintheoryandapplicationsofinformationsecurity.Itwas?rstinitiatedas a workshop(ISW) in Japan in 1997.This was followed by ISW 1999 in Malaysia and ISW 2000 in Australia. ISW became ISC when it was held in Spain in 2001 (ISC2001).ThelatestconferenceswereheldinBrazil(ISC2002),UK(ISC2003), USA(ISC2004),Singapore(ISC2005),Greece(ISC2006),andChile(ISC2007). ThisyeartheeventwassponsoredbytheChineseCryptologyandInformation- curity Association (Taiwan), the Taiwan Information Security Center of the - searchCenterforITInnovation(AcademiaSinica,Taiwan),theNationalTaiwan UniversityofScience andTechnology(Taiwan),the NTUCenterfor Information and Electronics Technologies(Taiwan), Academia Sinica (Taiwan), the National ScienceCouncil(Taiwan),the MinistryofEducation(Taiwan),the TaipeiCh- terofthe IEEEComputerSociety (Taiwan),BankProE-serviceTechnologyCo., Ltd.(Taiwan),ExsiorData &InformationTechnology,Inc.(Taiwan),Giga-Byte EducationFoundation(Taiwan),Hewlett-PackardTaiwan,HivocalTechnologies, Co.,Ltd.(
Taiwan),MicrosoftTaiwan,PaysecureTechnologyCo.,Ltd.(Taiwan), Symlink(Taiwan),and Yahoo!TaiwanHoldingsLimited(TaiwanBranch). In order to cover the conference's broad scope, this year's main Program Committee consisted of 61 experts from 22 countries. Additionally, the c- ference also featured a special AES Subcommittee, chaired by Vincent Rijmen (Graz University of Technology, Austria). Theconferencereceived134submissions from31countries,33(including 4 in the AES special session) of which were selected by the committee members for presentation at the conference, based on quality, originality and relevance. Each paperwasanonymouslyreviewedbyatleastthreecommitteemembers.Inorderto encourageandpromotestudentparticipation,theISC2008ProgramCommittee selected three student-coauthored papers for the Best Student Paper award,one fromeachregion:Asia,Europe,andtheAmericas.Thepaperswere,respectively, "Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family," bySomitraSanadhyaandPalashSarkar(IndianStatisticalInstitute,India),"C- lisions for RC4-Hash," by Sebastiaan Indesteege and Bart Preneel (Katholieke UniversiteitLeuven,Belgium),and"ProxyRe-signaturesintheStandardModel," byShermanS.
M. Chow(New YorkUniversity,USA) andRaphaelPhan(Lou- borough University, UK). The program also included invited speeches by Doug Tygar(UC Berkeley,USA) andTatsuakiOkamoto(NTT, Japan). Many people helped to make ISC 2008 successful. We would like to thank all thosewhocontributedtothetechnicalprogramandtoorganizingtheconference.

Contents

Trusted Computing.- Property-Based TPM Virtualization.- A Demonstrative Ad Hoc Attestation System.- Property-Based Attestation without a Trusted Third Party.- The Reduced Address Space (RAS) for Application Memory Authentication.- Database and System Security.- An Efficient PIR Construction Using Trusted Hardware.- Athos: Efficient Authentication of Outsourced File Systems.- BotTracer: Execution-Based Bot-Like Malware Detection.- Intrusion Detection.- Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.- Distinguishing between FE and DDoS Using Randomness Check.- Network Security.- Antisocial Networks: Turning a Social Network into a Botnet.- Compromising Anonymity Using Packet Spinning.- Behavior-Based Network Access Control: A Proof-of-Concept.- Path-Based Access Control for Enterprise Networks.- Cryptanalysis.- Cryptanalysis of Rabbit.- Algebraic Attack on HFE Revisited.- Revisiting Wiener's Attack - New Weak Keys in RSA.- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family.- Digital Signatures.- Proxy Re-signatures in the Standard Model.- An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner.- Certificate-Based Signature Schemes without Pairings or Random Oracles.- AES Special Session.- Improved Impossible Differential Attacks on Large-Block Rijndael.- A Five-Round Algebraic Property of the Advanced Encryption Standard.- Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication.- Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.- Symmetric Cryptography and Hash Functions.- Collisions for RC4-Hash.- New Applications of Differential Bounds of the SDS Structure.- Authentication.- HAPADEP: Human-Assisted Pure AudioDevice Pairing.- One-Time Password Access to Any Server without Changing the Server.- Can "Something You Know" Be Saved?.- Security Protocols.- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings.- A New (k,n)-Threshold Secret Sharing Scheme and Its Extension.- Strong Accumulators from Collision-Resistant Hashing.- A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.

最近チェックした商品