Information security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, proceedings / edited by Xuejia Lai, Jianying Zhou, Hui Li
Machine generated contents note: Attacks -- Replacement Attacks on Behavior Based Software Birthmark / Li Xie -- Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders / Serdar Pehlivanoglu -- How to Find Short RC4 Colliding Key Pairs / Atsuko Miyaji -- Protocols -- Formal Approach to Distance-Bounding RFID Protocols / Cristina Onete -- MASHA -- Low Cost Authentication with a New Stream Cipher / Kazuhide Fukushima -- Toward Pairing-Free Certificateless Authenticated Key Exchanges / Zhong Chen -- Public-Key Cryptosystems -- Security Analysis of an RSA Key Generation Algorithm with a Large Private Key / Lei Wu -- Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption / Kazumasa Omote -- n-Diffie-Hellman Problem and Its Applications / Yu Chen -- Network Security -- RatBot Anti-enumeration Peer-to-Peer Botnets / Stephan Eidenbenz -- Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes / Simone Fischer-Hubner -- Software Security -- Multi-stage Binary Code Obfuscation Using Improved Virtual Machine / Yin Huang -- Detection and Analysis of Cryptographic Data Inside Software / Ran Yu -- System Security -- Sudo Web: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms / Evangelos P. Markatos -- Hello rootKitty: A Lightweight Invariance-Enforcing Framework / Wouter Joosen -- Opacity Analysis in Trust Management Systems / Masoud Koleini -- Database Security -- On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints / Lena Wiese -- Round-Efficient Oblivious Database Manipulation / Bingsheng Zhang -- Privacy-Preserving Join on Outsourced Database / Feng Xia -- Privacy -- APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks / Josep Domingo-Ferrer
Summary
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures
Analysis
Computer science
Software engineering
Data protection
Data encryption (Computer science)
Computer software
Systems and Data Security
Bibliography
Includes bibliographical references and author index