LEADER 07327nam 22008295 450 001 9910483667703321 005 20200707002528.0 010 $a3-540-38343-3 024 7 $a10.1007/11836810 035 $a(CKB)1000000000283884 035 $a(SSID)ssj0000318266 035 $a(PQKBManifestationID)11245588 035 $a(PQKBTitleCode)TC0000318266 035 $a(PQKBWorkID)10308177 035 $a(PQKB)11700305 035 $a(DE-He213)978-3-540-38343-7 035 $a(MiAaPQ)EBC3068190 035 $a(PPN)123137799 035 $a(EXLCZ)991000000000283884 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security$b[electronic resource] $e9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings /$fedited by Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XIV, 548 p.) 225 1 $aSecurity and Cryptology ;$v4176 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-38341-7 320 $aIncludes bibliographical references and index. 327 $aSoftware Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation -- Privacy and Anonymity -- Low Latency Anonymity with Mix Rings -- Breaking Four Mix-Related Schemes Based on Universal Re-encryption -- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy -- Protecting Data Privacy Through Hard-to-Reverse Negative Databases -- Block Ciphers and Hash Functions -- Related-Key Rectangle Attack on 42-Round SHACAL-2 -- On the Collision Resistance of RIPEMD-160 -- Digital Signatures -- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption -- Multi-party Concurrent Signatures -- Formal Security Model of Multisignatures -- Cryptanalysis of Variants of UOV -- Stream Ciphers -- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles -- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD?s -- Encryption I -- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice -- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search -- Collusion-Free Policy-Based Encryption -- Pervasive Computing -- Using Multiple Smart Cards for Signing Messages at Malicious Terminals -- Diverging Keys in Wireless Sensor Networks -- Encryption II -- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption -- Transparent Image Encryption Using Progressive JPEG -- Network Security -- Preserving TCP Connections Across Host Address Changes -- A Security Architecture for Protecting LAN Interactions -- Simulation of Internet DDoS Attacks and Defense -- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr -- Watermarking and DRM -- Rights Protection for Data Cubes -- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) -- Intrusion Detection and Worms -- Resistance Analysis to Intruders? Evasion of Detecting Intrusion -- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks -- Anomaly Intrusion Detection Based on Clustering a Data Stream -- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation -- Key Exchange -- An Authentication and Key Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders -- Security Protocols and Formal Methods -- Formalising Receipt-Freeness -- Enhancing the Security and Efficiency of 3-D Secure -- Designing and Verifying Core Protocols for Location Privacy -- Information Systems Security -- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches -- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. 330 $ath This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 ? September 2, 2006. The Conference was organized by the University of the Aegean, Greece. ISC was first initiated as a workshop, ISW in Japan in 1997, ISW 1999 in Mal- sia, ISW 2000 in Australia and then changed to the current name ISC when it was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), UK (ISC 2003), USA (ISC 2004), and Singapore (ISC 2005). ISC 2006 provided an international forum for sharing original research results and application experiences among specialists in fundamental and applied problems of - formation security. In response to the Call for Papers, 188 papers were submitted. Each paper was - viewed by three members of the PC, on the basis of their significance, novelty, and technical quality. Of the papers submitted, 38 were selected for presentation, with an acceptance rate of 20%. 410 0$aSecurity and Cryptology ;$v4176 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputer communication systems 606 $aSpecial purpose computers 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aComputer communication systems. 615 0$aSpecial purpose computers. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aKatsikas$b Sokratis K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBackes$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGritzalis$b Stefanos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPreneel$b Bart$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aISC (Conference : Information security) 906 $aBOOK 912 $a9910483667703321 996 $aInformation Security$9771885 997 $aUNINA