Skip to main content
  • Conference proceedings
  • © 2006

Advances in Information and Computer Security

First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4266)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IWSEC: International Workshop on Security

Conference proceedings info: IWSEC 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

  2. Signatures (1)

    1. ID-Based Ring Signature Scheme Secure in the Standard Model

      • Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
      Pages 1-16
  3. Security Evaluation

    1. A Model-Based Method for Security Configuration Verification

      • Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa
      Pages 60-75
    2. Personal Computer Privacy: Analysis for Korean PC Users

      • Young Chul Kwon, Sang Won Lee, Songchun Moon
      Pages 76-87
  4. Signatures (2)

    1. Short Traceable Signatures Based on Bilinear Pairings

      • Seung Geol Choi, Kunsoo Park, Moti Yung
      Pages 88-103
    2. Ring Signature with Designated Linkability

      • Joseph K. Liu, Willy Susilo, Duncan S. Wong
      Pages 104-119
    3. Ad Hoc Group Signatures

      • Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
      Pages 120-135
    4. Rateless Codes for the Multicast Stream Authentication Problem

      • Christophe Tartary, Huaxiong Wang
      Pages 136-151
  5. Authentication

    1. Crossing Borders: Security and Privacy Issues of the European e-Passport

      • Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur
      Pages 152-167
    2. A New Approach to Hide Policy for Automated Trust Negotiation

      • Hai Jin, Zhensong Liao, Deqing Zou, Weizhong Qiang
      Pages 168-178
    3. Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing

      • Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu
      Pages 179-195
    4. IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures

      • James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry
      Pages 196-211
  6. Security for Multimedia

    1. Real-Time Watermark Embedding for High Resolution Video Watermarking

      • In-Koo Kang, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee
      Pages 227-238
    2. Inhibiting Card Sharing Attacks

      • Michael Tunstall, Konstantinos Markantonakis, Keith Mayes
      Pages 239-251
  7. Network Security

    1. Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks

      • Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim
      Pages 268-277

Other Volumes

  1. Advances in Information and Computer Security

About this book

ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop was our ?rst trial in that two major academic society groups on security in Japan, viz. ISEC and CSEC, jointly organized it; ISEC is a te- nical group on information security of the Institute of Electronics, Information and Communication Engineers (IEICE), and CSEC is a special interest group on computer security of the Information Processing Society of Japan (IPSJ). It was Ryoichi Sasaki, the former head of CSEC, who proposed holding such an international workshop in Japan for the ?rst time, two years ago. The two groups supported his idea and started organizing the workshop. CSEC has its annual domestic symposium, the Computer Security Symposium (CSS), in - tober for three days, and we decided to organize the workshop prior to CSS this year. The initial aim of the workshop was primarily to provide young researchers with the opportunity to present their work in English. However, due to more submissions than we had anticipated, the quality of the accepted papers became far better than we had expected. Theconferencereceived147submissions,outofwhichtheprogramcommittee selected 30 for presentation. These proceedings contain the ?nal versions of the accepted papers, which the authors ?nalized on the basis of comments from the reviewers. Since these revisions were not subject to editorial review, the authors bear full responsibility for the contents of their papers.

Editors and Affiliations

  • Faculty of Electro-Communication, The University of Electro-Communications, Chofu, Japan

    Hiroshi Yoshiura

  • Department of Computer Science, Communication Engineering, Kyushu University, Fukuoka, Japan

    Kouichi Sakurai

  • Institute of Business Informatics, Goethe University Frankfurt, Frankfurt/Main, Germany

    Kai Rannenberg

  • Faculty of Software and Information Science, Iwate Prefectural University, Iwate, Japan

    Yuko Murayama

  • Toshiba Corporation, Kawasaki, Japan

    Shinichi Kawamura

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access