Advances in information and computer security : 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011 : proceedings / Tetsu Iwata, Masakatsu Nishigaki (eds.)
Machine generated contents note: Software Protection and Reliability -- New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes / Minoru Kuribayashi -- REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points / Angelos D. Keromytis -- Cryptographic Protocol -- Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique / Atsushi Fujioka -- Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits / Tatsuaki Okamoto -- Pairing and Identity-Based Signature -- Cryptographic Pairings Based on Elliptic Nets / Eiji Okamoto -- Identity-Based Deterministic Signature Scheme without Forking-Lemma / C. Pandu Rangan -- Malware Detection -- Nitro: Hardware-Based System Call Tracing for Virtual Machines / Claudia Eckert -- Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking / Angelos D. Keromytis -- Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks / Behrouz Tork Ladani -- Mathematical and Symmetric Cryptography -- Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators / Yasuhide Numata -- Theoretical Analysis of the Structure of HC-128 / Shashwat Raizada -- Experimental Verification of Super-Sbox Analysis -- Confirmation of Detailed Attack Complexity / Kazuo Ohta -- Public Key Encryption -- Towards Restricting Plaintext Space in Public Key Encryption / Kazumasa Omote -- Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption / Koji Okada
Summary
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature; malware detection; mathematical and symmetric cryptography; public key encryption