Skip to main content
  • Conference proceedings
  • © 2007

Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues

11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4435)

Part of the book sub series: Theoretical Computer Science and General Issues (LNTCS)

Conference series link(s): ASIAN: Asian Computer Science Conference

Conference proceedings info: ASIAN 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. ASIAN’2006

    1. A Symbolic Intruder Model for Hash-Collision Attacks

      • Yannick Chevalier, Mounira Kourjieh
      Pages 13-27
    2. Certificateless Authenticated Two-Party Key Agreement Protocols

      • Tarjei K. Mandt, Chik How Tan
      Pages 37-44
    3. FORM : A Federated Rights Expression Model for Open DRM Frameworks

      • Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia
      Pages 45-59
    4. Automata-Based Confidentiality Monitoring

      • Gurvan Le Guernic, Anindya Banerjee, Thomas Jensen, David A. Schmidt
      Pages 75-89
    5. Efficient and Practical Control Flow Monitoring for Program Security

      • Nai Xia, Bing Mao, Qingkai Zeng, Li Xie
      Pages 90-104
    6. Modular Formalization of Reactive Modules in COQ

      • Ming-Hsien Tsai, Bow-Yaw Wang
      Pages 105-119
    7. Closing Internal Timing Channels by Transformation

      • Alejandro Russo, John Hughes, David Naumann, Andrei Sabelfeld
      Pages 120-135
    8. Responsiveness in Process Calculi

      • Lucia Acciai, Michele Boreale
      Pages 136-150
    9. Normal Proofs in Intruder Theories

      • Vincent Bernat, Hubert Comon-Lundh
      Pages 151-166
    10. Breaking and Fixing Public-Key Kerberos

      • Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad
      Pages 167-181
    11. Computational Soundness of Formal Indistinguishability and Static Equivalence

      • Gergei Bana, Payman Mohassel, Till Stegers
      Pages 182-196
    12. Secrecy Analysis in Protocol Composition Logic

      • Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert
      Pages 197-213
    13. On Completeness of Logical Relations for Monadic Types

      • SÅ‚awomir Lasota, David Nowak, Yu Zhang
      Pages 223-230
    14. Information Hiding in the Join Calculus

      • Qin Ma, Luc Maranget
      Pages 240-247

Other Volumes

  1. Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access