IFIP TC6 Open Digital Library

SEC 2005: Makuhari-Messe, Chiba, Japan

Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan

Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura

Springer, IFIP 181, ISBN: 0-387-25658-X


Privacy and Anonymity

Accountable Anonymous E-Mail.

Vincent Naessens, Bart De Decker, Liesje Demuynck


Protecting Consumer Data in Composite Web Services.

Craig Pearce, Peter Bertók, Ron G. van Schyndel


Security Management

A Decision Matrix Approach.

Albin Zuccato


Assignment of Security Clearances in an Organization.

Lech J. Janczewski, Victor Portougal


Tool Supported Management of Information Security Culture.

Thomas Schlienger, Stephanie Teufel


Security Architecture

ERPSEC - A Reference Framework to Enhance Security in ERP Systems.

Sebastiaan H. von Solms, M. P. Hertenberger


A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.

Yanjiang Yang, Feng Bao, Robert H. Deng


A Secure Quantum Communication Protocol Using Insecure Public Channels.

I-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo


Trusted Computing Systems

Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.

Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano


Design and Implementation a TPM Chip SUP320 by SOC.

Jiang-chun Ren, Kui Dai, Zhiying Wang, Xue-mi Zhao, Yuan-man Tong


Mathematical Models of IP Traceback Methods and Their Verification.

Keisuke Ohmori, Ayako Suzuki, Mariko Kawabata, Ryu Matsushima, Manabu Ohmuro, Toshifumi Kai, Shigeru Nishiyama


Secure Commercial Systems

Transferable E-Cash Revisit.

Joseph K. Liu, Sandy H. Wong, Duncan S. Wong


A License Transfer System for Supporting Content Portability in Digital Rights Management.

Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard


Secure Person-To-Person Communications Based on Biometrics Signals.

Yongdong Wu, Feng Bao, Robert H. Deng


Mobility and Ubiquitous Security

Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks.

Laurent Bussard, Walid Bagga


An Adaptive Multicast Polling Scheme for IEEE 802.11 Wireless LAN.

Kyung-jun Kim, HyunSook Kim, Sang-Don Lee, Ki Jun Han


The Pairing Problem with User Interaction.

Thomas Peyrin, Serge Vaudenay


Internet and Web Security

Network Smart Card: A New Paradigm of Secure Online Transactions.

Asad M. Ali, Karen Lu, Michael Montgomery


Protection Against Spam Using Pre-Challenges.

Rodrigo Roman, Jianying Zhou, Javier Lopez


Automatically Hardening Web Applications Using Precise Tainting.

Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans


Internet Security to DoS Attack

Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme.

Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman


Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.

John Haggerty, Qi Shi, Madjid Merabti


Intrusion Detection

Design, Implementation, and Evaluation of "FRiTrace".

Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu


Design and Implementation of a High-Performance Network Intrusion Prevention System.

Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos


STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.

Periklis Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis


Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.

Spyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos


Digital Signature Schemes

Designated-Verifier Proxy Signature Schemes.

Guilin Wang


Tripartite Concurrent Signatures.

Willy Susilo, Yi Mu


Signcryption in Hierarchical Identity Based Cryptosystem.

Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu


Key Management

Protecting Group Dynamic Information in Large Scale Multicast Groups.

Yongdong Wu, Tieyan Li, Robert H. Deng


Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks.

Shrikant Sundaram, Peter Bertók, Benjamin Burton


Security for Multimedia

Ensuring Media Integrity on Third-Party Infrastructures.

Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith


A New Fragile Mesh Watermarking Algorithm for Authentication.

Hao-Tian Wu, Yiu-ming Cheung


New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images.

Yuji Suga



Overcoming Channel Bandwidth Constraints in Secure SIM Applications.

John A. MacDonald, William G. Sirett, Chris J. Mitchell


On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.

K. Papapanagiotou, Constantinos Markantonakis, Qing Zhang 0002, William G. Sirett, Keith Mayes


On-the-Fly Formal Testing of a Smart Card Applet.

Arjen van Weelden, Martijn Oostdijk, Lars Frantzen, Pieter W. M. Koopman, Jan Tretmans


Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search.

Joel VanLaven, Mark Brehob, Kevin J. Compton


The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations.

Sylvain Guilley, Philippe Hoogvorst


StreamTo: Streaming Content using a Tamper-Resistant Token.

Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus