SEC 2005: Makuhari-Messe, Chiba, Japan
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan
Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura
Springer, IFIP 181, ISBN: 0-387-25658-X
Contents
Privacy and Anonymity
Protecting Consumer Data in Composite Web Services.
Craig Pearce, Peter Bertók, Ron G. van Schyndel
19-34
Security Management
Tool Supported Management of Information Security Culture.
Thomas Schlienger, Stephanie Teufel
65-78
Security Architecture
ERPSEC - A Reference Framework to Enhance Security in ERP Systems.
Sebastiaan H. von Solms, M. P. Hertenberger
79-94
Yanjiang Yang, Feng Bao, Robert H. Deng
95-112
A Secure Quantum Communication Protocol Using Insecure Public Channels.
I-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo
113-126
Trusted Computing Systems
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.
Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano
127-142
Design and Implementation a TPM Chip SUP320 by SOC.
Jiang-chun Ren, Kui Dai, Zhiying Wang, Xue-mi Zhao, Yuan-man Tong
143-154
Mathematical Models of IP Traceback Methods and Their Verification.
Keisuke Ohmori, Ayako Suzuki, Mariko Kawabata, Ryu Matsushima, Manabu Ohmuro, Toshifumi Kai, Shigeru Nishiyama
155-170
Secure Commercial Systems
A License Transfer System for Supporting Content Portability in Digital Rights Management.
Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard
189-204
Secure Person-To-Person Communications Based on Biometrics Signals.
Yongdong Wu, Feng Bao, Robert H. Deng
205-222
Mobility and Ubiquitous Security
Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks.
Laurent Bussard, Walid Bagga
223-238
An Adaptive Multicast Polling Scheme for IEEE 802.11 Wireless LAN.
Kyung-jun Kim, HyunSook Kim, Sang-Don Lee, Ki Jun Han
239-250
Internet and Web Security
Network Smart Card: A New Paradigm of Secure Online Transactions.
Asad M. Ali, Karen Lu, Michael Montgomery
267-280
Automatically Hardening Web Applications Using Precise Tainting.
Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans
295-308
Internet Security to DoS Attack
Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman
309-326
Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.
John Haggerty, Qi Shi, Madjid Merabti
327-342
Intrusion Detection
Design, Implementation, and Evaluation of "FRiTrace".
Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu
343-358
Design and Implementation of a High-Performance Network Intrusion Prevention System.
Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos
359-374
STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.
Periklis Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis
375-392
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.
Spyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos
393-408
Digital Signature Schemes
Signcryption in Hierarchical Identity Based Cryptosystem.
Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu
443-457
Key Management
Protecting Group Dynamic Information in Large Scale Multicast Groups.
Yongdong Wu, Tieyan Li, Robert H. Deng
459-476
Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks.
Shrikant Sundaram, Peter Bertók, Benjamin Burton
477-492
Security for Multimedia
Ensuring Media Integrity on Third-Party Infrastructures.
Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
493-508
Yuji Suga
525-536
JavaCards
Overcoming Channel Bandwidth Constraints in Secure SIM Applications.
John A. MacDonald, William G. Sirett, Chris J. Mitchell
539-550
K. Papapanagiotou, Constantinos Markantonakis, Qing Zhang 0002, William G. Sirett, Keith Mayes
551-564
On-the-Fly Formal Testing of a Smart Card Applet.
Arjen van Weelden, Martijn Oostdijk, Lars Frantzen, Pieter W. M. Koopman, Jan Tretmans
565-576
Joel VanLaven, Mark Brehob, Kevin J. Compton
577-588
The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations.
Sylvain Guilley, Philippe Hoogvorst
589-600
StreamTo: Streaming Content using a Tamper-Resistant Token.
Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus
601-612