Skip to main content
  • Conference proceedings
  • © 2007

Advances in Computer Science - ASIAN 2007. Computer and Network Security

12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4846)

Part of the book sub series: Theoretical Computer Science and General Issues (LNTCS)

Conference series link(s): ASIAN: Asian Computer Science Conference

Conference proceedings info: ASIAN 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Invited Speaker: Andrei Sabelfeld

    1. Session 1: Program Security

      1. A Static Birthmark of Binary Executables Based on API Call Structure
        • Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han
        Pages 2-16
      2. Compiling C Programs into a Strongly Typed Assembly Language
        • Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezawa
        Pages 17-32
      3. Information Flow Testing
        • Gurvan Le Guernic
        Pages 33-47
    2. Session 2: Short Papers on Computer Security

      1. Large Scale Simulation of Tor:
        • Gavin O’Gorman, Stephen Blott
        Pages 48-54
      2. Privacy Enhancing Credentials
        • Junji Nakazato, Lihua Wang, Akihiro Yamamura
        Pages 55-61
      3. Browser Based Agile E-Voting System
        • Sriperumbuduru Kandala Simhalu, Keiji Takeda
        Pages 62-69
      4. Risk Balance in Exchange Protocols
        • Mohammad Torabi Dashti, Yanjing Wang
        Pages 70-77
      5. Scalable DRM System for Media Portability
        • Hyoungshick Kim
        Pages 78-85
      6. Computational Semantics for Basic Protocol Logic – A Stochastic Approach
        • Gergei Bana, Koji Hasebe, Mitsuhiro Okada
        Pages 86-94
    3. Session 3: Access Control

      1. An Integrated Model for Access Control and Information Flow Requirements
        • Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens
        Pages 111-125
  3. Invited Speaker: Joshua Guttman

    1. How to do Things with Cryptographic Protocols

      • Joshua D. Guttman
      Pages 142-149
    2. Session 4: Protocols

      1. A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
        • Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson
        Pages 150-165
  4. Invited Speaker: Kazuhiko Kato

    1. Session 5: Intrusion Detection

Other Volumes

  1. Advances in Computer Science – ASIAN 2007. Computer and Network Security

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access