Information Security Applications: 11th International by Sumit Kumar Pandey, Rana Barua (auth.), Yongwha Chung, Moti

By Sumit Kumar Pandey, Rana Barua (auth.), Yongwha Chung, Moti Yung (eds.)

This publication constitutes the refereed lawsuits of the eleventh foreign Workshop on details protection functions, WISA 2010, held in Jeju Island, Korea, in August 2010.

The 25 revised complete papers provided have been conscientiously reviewed and chosen from 107 submissions. The papers are prepared in topical sections on cryptosystem, implementation, cellular security/secure coding, assault, biometrics, and safe protocol.

Show description

Read Online or Download Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers PDF

Best security books

Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everybody desires privateness and protection on-line, whatever that almost all laptop clients have kind of given up on so far as their own information is worried. there's no scarcity of fine encryption software program, and no scarcity of books, articles and essays that purport to be approximately find out how to use it. but there's beneficial little for usual clients who wish simply enough information regarding encryption to exploit it adequately and securely and appropriately--WITHOUT having to develop into specialists in cryptography.

Comprehensive Security in Asia: Views from Asia and the West on a Changing Security Environment

This can be an exam of "Comprehensive defense" as a coverage that is going past the necessities of army defence opposed to a selected "enemy" to emphasize the necessity to have in mind different facets important to nationwide balance: meals, strength, surroundings, conversation and social defense.

Protecting Human Security in Africa

Holding Human defense in Africa discusses the most effective threats to human safeguard in Africa. It offers specially with these threats to the safety of African humans that are least understood or explored. In subject matters various from corruption, the proliferation of small palms and light-weight guns, nutrients defense, the devastation of inner displacement in Africa, the hyperlink among average assets and human safety, to the issues of compelled labour, threatsto women's protection, and environmental safety, the ebook examines the felony and coverage demanding situations of shielding human protection in Africa.

Extra info for Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers

Example text

232–249. Springer, Heidelberg (1994) 4. : Predicate-based key exchange. , Hawkes, P. ) ACISP 2010. LNCS, vol. 6168, pp. 282–299. Springer, Heidelberg (2010) 5. : Key agreement protocols and their security analysis. In: 6th IMA International Conference, pp. 30–45 (1997) 6. : Security of two-party identity-based key agreement. , Vaudenay, S. ) Mycrypt 2005. LNCS, vol. 3715, pp. 229–243. Springer, Heidelberg (2005) 7. : Analysis of key-exchange protocols and their use for building secure channels.

Moreover, we say that predicate-based AKE protocol Π is selective-condition secure in the predicate-based eCK model, if the adversary A outputs (δA , δB ) at the beginning of the security experiment. 3 Proposed Two-Pass Attribute-Based AKE Protocol We constructed a attribute-based AKE protocol based on attribute-based encryption schemes [14,10]. By applying the NAXOS technique [13], the proposed protocol can satisfy the predicate-based eCK security, under the gap Bilinear Diffie-Hellman (BDH) assumption [2] in the random oracle model.

The proposed eCK security model for predicate-based AKE is different from the original eCK security model for PKI-based AKE in the following points: 1) the session is identified by the string γi of user Ui , 2) freshness conditions for StaticKeyReveal queries are different, and 3) MasterKeyReveal query is allowed for the adversary the same as in ID-based AKE. Algorithms. Predicate-based AKE protocol Π consists of the following algorithms. We denote a user as Ui and the user’s associated string as γi .

Download PDF sample

Rated 4.95 of 5 – based on 13 votes