Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japan /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Sasaki, Ryoichi., Qing, Sihan., Okamoto, Eiji., Yoshiura, Hiroshi.
Format: Electronic
Language: English
Published: Boston, MA : Springer US, 2005.
Series: IFIP Advances in Information and Communication Technology, 181
Online Access:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Regular Papers
  • Accountable Anonymous E-Mail
  • Protecting Consumer Data in Composite Web Services
  • A Decision Matrix Approach
  • Assignment of Security Clearances in an Organization
  • Tool Supported Management of Information Security Culture
  • ERPSEC - A Reference Framework to Enhance Security in ERP Systems
  • A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises
  • A Secure Quantum Communication Protocol Using Insecure Public Channels
  • Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems
  • Design and Implementation of TPM SUP320
  • Mathematical Models of IP Traceback Methods and Their Verification
  • Transferable E-Cash Revisit
  • A License Transfer System for Supporting Content Portability in Digital Rights Management
  • Secure Human Communications Based on Biometrics Signals
  • Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks
  • An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN
  • The Pairing Problem with User Interaction
  • Network Smart Card
  • Protection Against Spam Using Pre-Challenges
  • Automatically Hardening Web Applications Using Precise Tainting
  • Traffic Redirection Attack Protection System (TRAPS)
  • Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks
  • Design, Implementation, and Evaluation of Fritrace
  • Design and Implementation of a High-Performance Network Intrusion Prevention System
  • STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis
  • Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection
  • Designated-Verifier Proxy Signature Schemes
  • Tripartite Concurrent Signatures
  • Signcryption in Hierarchical Identity Based Cryptosystem
  • Protecting Group Dynamic Information in Large Scale Multicast Groups
  • Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks
  • Ensuring Media Integrity on Third-Party Infrastructures
  • A New Fragile Mesh Watermarking Algorithm for Authentication
  • New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images
  • Workshop Papers
  • Overcoming Channel Bandwidth Constraints in Secure SIM Applications
  • On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation
  • On-the-Fly Formal Testing of a Smart Card Applet
  • A Computationally Feasible SPA Attack on AES VIA Optimized Search
  • The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations
  • Streamto: Streaming Content Using a Tamper-Resistant Token.