IFIP TC6 Open Digital Library

SEC 2005: Makuhari-Messe, Chiba, Japan

Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan

Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura

Springer, IFIP 181, ISBN: 0-387-25658-X



Contents

Privacy and Anonymity

Accountable Anonymous E-Mail.

Vincent Naessens, Bart De Decker, Liesje Demuynck

 3-18

Protecting Consumer Data in Composite Web Services.

Craig Pearce, Peter Bertók, Ron G. van Schyndel

 19-34

Security Management

A Decision Matrix Approach.

Albin Zuccato

 35-50

Assignment of Security Clearances in an Organization.

Lech J. Janczewski, Victor Portougal

 51-64

Tool Supported Management of Information Security Culture.

Thomas Schlienger, Stephanie Teufel

 65-78

Security Architecture

ERPSEC - A Reference Framework to Enhance Security in ERP Systems.

Sebastiaan H. von Solms, M. P. Hertenberger

 79-94

A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.

Yanjiang Yang, Feng Bao, Robert H. Deng

 95-112

A Secure Quantum Communication Protocol Using Insecure Public Channels.

I-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo

 113-126

Trusted Computing Systems

Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.

Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano

 127-142

Design and Implementation a TPM Chip SUP320 by SOC.

Jiang-chun Ren, Kui Dai, Zhiying Wang, Xue-mi Zhao, Yuan-man Tong

 143-154

Mathematical Models of IP Traceback Methods and Their Verification.

Keisuke Ohmori, Ayako Suzuki, Mariko Kawabata, Ryu Matsushima, Manabu Ohmuro, Toshifumi Kai, Shigeru Nishiyama

 155-170

Secure Commercial Systems

Transferable E-Cash Revisit.

Joseph K. Liu, Sandy H. Wong, Duncan S. Wong

 171-188

A License Transfer System for Supporting Content Portability in Digital Rights Management.

Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard

 189-204

Secure Person-To-Person Communications Based on Biometrics Signals.

Yongdong Wu, Feng Bao, Robert H. Deng

 205-222

Mobility and Ubiquitous Security

Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks.

Laurent Bussard, Walid Bagga

 223-238

An Adaptive Multicast Polling Scheme for IEEE 802.11 Wireless LAN.

Kyung-jun Kim, HyunSook Kim, Sang-Don Lee, Ki Jun Han

 239-250

The Pairing Problem with User Interaction.

Thomas Peyrin, Serge Vaudenay

 251-266

Internet and Web Security

Network Smart Card: A New Paradigm of Secure Online Transactions.

Asad M. Ali, Karen Lu, Michael Montgomery

 267-280

Protection Against Spam Using Pre-Challenges.

Rodrigo Roman, Jianying Zhou, Javier Lopez

 281-294

Automatically Hardening Web Applications Using Precise Tainting.

Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans

 295-308

Internet Security to DoS Attack

Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme.

Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman

 309-326

Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.

John Haggerty, Qi Shi, Madjid Merabti

 327-342

Intrusion Detection

Design, Implementation, and Evaluation of "FRiTrace".

Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu

 343-358

Design and Implementation of a High-Performance Network Intrusion Prevention System.

Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos

 359-374

STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis.

Periklis Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis

 375-392

Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.

Spyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos

 393-408

Digital Signature Schemes

Designated-Verifier Proxy Signature Schemes.

Guilin Wang

 409-424

Tripartite Concurrent Signatures.

Willy Susilo, Yi Mu

 425-442

Signcryption in Hierarchical Identity Based Cryptosystem.

Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu

 443-457

Key Management

Protecting Group Dynamic Information in Large Scale Multicast Groups.

Yongdong Wu, Tieyan Li, Robert H. Deng

 459-476

Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks.

Shrikant Sundaram, Peter Bertók, Benjamin Burton

 477-492

Security for Multimedia

Ensuring Media Integrity on Third-Party Infrastructures.

Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith

 493-508

A New Fragile Mesh Watermarking Algorithm for Authentication.

Hao-Tian Wu, Yiu-ming Cheung

 509-524

New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images.

Yuji Suga

 525-536

JavaCards

Overcoming Channel Bandwidth Constraints in Secure SIM Applications.

John A. MacDonald, William G. Sirett, Chris J. Mitchell

 539-550

On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.

K. Papapanagiotou, Constantinos Markantonakis, Qing Zhang 0002, William G. Sirett, Keith Mayes

 551-564

On-the-Fly Formal Testing of a Smart Card Applet.

Arjen van Weelden, Martijn Oostdijk, Lars Frantzen, Pieter W. M. Koopman, Jan Tretmans

 565-576

Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search.

Joel VanLaven, Mark Brehob, Kevin J. Compton

 577-588

The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations.

Sylvain Guilley, Philippe Hoogvorst

 589-600

StreamTo: Streaming Content using a Tamper-Resistant Token.

Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus

 601-612