Skip to main content
  • Conference proceedings
  • © 2007

Advances in Information and Computer Security

Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4752)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IWSEC: International Workshop on Security

Conference proceedings info: IWSEC 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

  2. Software and Multimedia Security

    1. Design Issues of an Isolated Sandbox Used to Analyze Malwares

      • Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda
      Pages 13-27
    2. Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique

      • Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii
      Pages 28-43
  3. Public-Key Cryptography (1)

    1. Reduction Optimal Trinomials for Efficient Software Implementation of the η T Pairing

      • Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi
      Pages 44-57
    2. Experiments on the Linear Algebra Step in the Number Field Sieve

      • Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda
      Pages 58-73
    3. Batch Pairing Delegation

      • Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith
      Pages 74-90
    4. Network Security

      1. A Global Authentication Scheme for Mobile Ad-Hoc Networks
        • P. Caballero-Gil, C. Caballero-Gil
        Pages 105-120
      2. An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks
        • Junbeom Hur, Chanil Park, Hyunsoo Yoon
        Pages 121-136
      3. Intrusion Detection and Identification System Using Data Mining and Forensic Techniques
        • Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang
        Pages 137-152
    5. E-commerce and Voting

      1. Run-Time Randomization to Mitigate Tampering
        • Bertrand Anckaert, Mariusz Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere
        Pages 153-168
      2. Privacy-Preserving Eigentaste-Based Collaborative Filtering
        • Ibrahim Yakut, Huseyin Polat
        Pages 169-184
      3. Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks
        • Alexandre Viejo, Francesc Sebé, Josep Domingo-Ferrer
        Pages 185-198
      4. Verifiable Internet Voting Solving Secure Platform Problem
        • Mirosław Kutyłowski, Filip Zagórski
        Pages 199-213
    6. Operating Systems

      1. Enforcement of Integrated Security Policy in Trusted Operating Systems
        • Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai
        Pages 214-229
      2. <i>Salvia</i>: A Privacy-Aware Operating System for Prevention of Data Leakage
        • Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo
        Pages 230-245
  4. Public-Key Cryptography (2)

    1. Generic Certificateless Encryption in the Standard Model

      • Qiong Huang, Duncan S. Wong
      Pages 278-291

Other Volumes

  1. Advances in Information and Computer Security

About this book

The International Workshop on Security (IWSEC 2007) was the second in the annualseriesthat startedin 2006.IWSEC 2007washeld at the New Public Hall in Nara, Japan, during October 29–31, 2007. This year there were 112 paper submissions, and from these 30 papers were accepted. Accepted papers came from 27 di?erent countries, with the largest proportion coming from Japan (12). Estonia, China, Korea, Spain, Taiwan and the USA contributed 2 papers each and Canada, Germany, Greece, Poland, Turkeyand Vietnam contributed 1 paper each. We would liketo thank all of the authors who submitted papers to IWSEC 2007. The contributed papers were supplemented by one invited talk from the - inent researcher Prof. Doug Tygar (UC Berkeley) in information security. We were fortunate to have an energetic team of experts who formed the Program Committee. Their names may be found overleaf, and we are sincerely grateful for all their great e?orts. This team was supported by an even larger number of individuals who reviewedpapers in their particularareasof expertise. A list of these names is also provided; we hope it is complete.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access