LEADER 04826nam 22008535 450 001 9910484474203321 005 20250616113240.0 010 $a3-540-89598-1 024 7 $a10.1007/978-3-540-89598-5 035 $a(CKB)1000000000545761 035 $a(SSID)ssj0000315987 035 $a(PQKBManifestationID)11212463 035 $a(PQKBTitleCode)TC0000315987 035 $a(PQKBWorkID)10263041 035 $a(PQKB)10849936 035 $a(DE-He213)978-3-540-89598-5 035 $a(MiAaPQ)EBC3063735 035 $a(MiAaPQ)EBC6696235 035 $a(Au-PeEL)EBL6696235 035 $a(PPN)13286150X 035 $a(EXLCZ)991000000000545761 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Information and Computer Security $eThird International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings /$fedited by Kanta Matsuura, Eiichiro Fujisaki 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XII, 299 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5312 300 $aInternational conference proceedings. 311 08$a3-540-89597-3 320 $aIncludes bibliographical references and index. 327 $aCryptography -- On Generating Elements of Orders Dividing p 2k ąp k ?+?1 -- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure -- Remarks on the Attack of Fouque et al. against the ?IC Scheme -- Signature and Signcryption -- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles -- Signcryption Scheme in Multi-user Setting without Random Oracles -- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices -- Software Security -- The Superdiversifier: Peephole Individualization for Software Protection -- Detecting Java Theft Based on Static API Trace Birthmark -- Online Network Forensics for Automatic Repair Validation -- Return Value Predictability Profiles for Self?healing -- Privacy Protection and Contents Protection -- Involuntary Information Leakage in Social Network Services -- Privacy Preserving Computations without Public Key Cryptographic Operation -- A Novel Framework for Watermarking: The Data-Abstracted Approach -- Invited Talk -- The Elliptic Curve Discrete Logarithm Problem: State of the Art -- Authentication and Access Control -- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication -- Analysis of a Biometric Authentication Protocol for Signature Creation Application -- Efficient Secure Labeling Method under Dynamic XML Data Streams -- Implementation -- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems -- The Long-Short-Key Primitive and Its Applications to Key Security. 330 $aThis book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008. The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on cryptography, signature and signcryption, software security, privacy protection and contents protection, authentication and access control, as well as implementation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5312 606 $aData protection 606 $aOperating systems (Computers) 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aComputer networks 606 $aAlgorithms 606 $aData and Information Security 606 $aOperating Systems 606 $aIT Operations 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aAlgorithms 615 0$aData protection. 615 0$aOperating systems (Computers) 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aAlgorithms. 615 14$aData and Information Security. 615 24$aOperating Systems. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aAlgorithms. 676 $a005.8 686 $a54.30$2bcl 702 $aMatsuura$b Kanta 702 $aFujisaki$b Eiichiro 712 12$aInternational Workshop on Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484474203321 996 $aAdvances in Information and Computer Security$92904912 997 $aUNINA