Academic Track [32 papers are selected out of 191 submissions
to the academic track.]
Session 1A: Cryptographic Applications Multi-Party Computation from any Linear Secret Sharing Scheme
Unconditionally Secure against Adaptive Adversary: The Zero-Error Case
Ventzislav Nikov, Svetla Nikova, and Bart Preneel
The Netherlands
/ Belgium
Optimized $\chi^2$-Attack against RC6
Norihisa Isogai, Takashi Matsunaka, and Atsuko Miyaji
Japan
Anonymity-Enhanced Pseudonym System
Yuko Tamura and Atsuko Miyaji
Japan
Session
2A: Intrusion Detection
Using Feedback to Improve Masquerade Detection
Kwong Yung
USA
Efficient Presentation of Multivariate Audit Data for Intrusion Detection
of Web-Based Internet Services
Zhi Guo, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu, and Jia-Guang
Sun
China
An IP Traceback Scheme Integrating DPM and PPM
Fan Min, Junyan Zhang, and Guowei Yang
China
Session 3A: Cryptographic Algorithms
Improved Scalable Hash Chain Traversal
Sung-Ryul Kim
Korea
Round Optimal Distributed Key Generation of Threshold Cryptosystem
Based on Discrete Logarithm Problem
Rui Zhang and Hideki Imai
Japan
On the Security of Two Threshold Signature Schemes with Traceable
Signers
Guilin Wang, Xiaoxi Han, and Bo Zhu
Singapore
Session 4A: Digital Signature
Proxy and Threshold One-Time Signatures
Mohamed
Al-Ibrahim and Anton Cerny
Australia
/ Kuwait
A Threshold GQ Signature Scheme
Li-Shan
Liu, Cheng-Kang Chu, and Wen-Guey Tzeng
Taiwan
Generalized Key-Evolving Signature Schemes or How to Foil an Armed
Adversary
Gene
Itkis and Peng Xie
USA
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
Chongzhi
Gao, Zheng'an Yao, and Lei Li
China
Session 5A: Security Modelling
Modelling and Evaluating Trust Relationships in Mobile Agents Based
Systems
Ching
Lin and Vijay Varadharajan
Australia
An Authorization Model for e-Consent Requirement in a Health Care
Application
Chun
Ruan and Vijay Varadharajan
Australia
PLI: A New Framework to Protect Digital Content for P2P Networks
Guofei
Gu, Bin Zhu, Shipeng Li, and Shiyong Zhang
China
Session 6A: Web Security
Improved Algebraic Traitor Tracing Scheme
Chunyan
Bai and Guiliang Feng
USA
Common Vulnerability Markup Language
Haitao
Tian, Liusheng Huang, Zhi Zhou, and Hui Zhang
China
Trust on Web Browser: Attack vs. Defense
Tie-Yan
Li and Yongdong Wu
Singapore
Session 7A: Security Protocols
Security Protocols for Biometrics-Based Cardholder Authentication
in Smartcards
Luciano
Rila and Chris J. Mitchell
UK
Does it Need Trusted Third Party? Design of Buyer-Seller Watermarking
Protocol without Trusted Third Party
Jae-Gwi
Choi, Kouichi Sakurai, and Ji-Hwan Park
Korea
/ Japan
Using OCSP to Secure Certificate-Using Transactions in m-Commerce
Jose
L. Munoz, Jordi Forne, Oscar Esparza, Isidoro Bernabe, and Miguel Soriano
Spain
Session 8A: Cryptanalysis
Differential Fault Analysis on A.E.S.
P.
Dusart, G. Letourneux, and O. Vivolo
France
Side-Channel Attack on Substitution Blocks
Roman
Novak
Slovenia
Timing Attack Against Implementation of a Parallel Algorithm for
Modular Exponentiation
Yasuyuki
Sakai and Kouichi Sakurai
Japan
A Fast Correlation Attack on LFSR-Based Stream Ciphers
Sarbani
Palit, Bimal Roy, and Arindom De
India
Session 9A: Key Management
Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficient
Gang
Yao, Kui Ren, Feng Bao, Robert H. Deng, and Dengguo Feng
Singapore
/ China
An Efficient Tree-Based Group Key Agreement using Bilinear Map
Sangwon
Lee, Yongdae Kim, Kwangjo Kim, and Dae-Hyun Ryu
Korea
A Key Recovery Mechanism for Reliable Group Key Management
Taenam
Cho and Sang-Ho Lee
Korea
Session 10A: Efficient Implementations
Efficient Software Implementation of LFSR and Boolean Function and
its Application to Nonlinear Combiner Model
Sandeepan
Chaudhury and Subhamoy Maitra
India
Efficient Distributed Signcryption Scheme as Group Signcryption
Dongjin
Kwak and Sangjae Moon
Korea
Architectural Enhancements for Montgomery Multiplication on Embedded
RISC Processors
Johann
Groszschaedl and Guy-Armand Kamendje
Austria
Technical Track
Session 1T: Security Analysis An
Example of a Man-in-the-middle Attack against Server Authenticated SSL-session
Mattias Eriksson
Sweden
A
Defect of the Implementation Schemes of the TTM Cryptosystem
Jintai Ding and Dieter Schmidt
USA
An
Attack Strategy for Incremental Hash Function based on Pair Chaining &
XOR Combining
Bok-Min Goi, M. U. Siddiqi, and Hean-Teik Chuah
Malaysia
Session 2T:
Cryptographic Algorithms
Identification Schemes from Lattice Distinguishing Problem
Khanh Nguyen
Singapore
Cryptanalysis of AES Implemented on Computers with Cache
Yukiyasu Tsunoo, Hiroyasu Kubo, Maki Shigeri, and Hiroshi
Miyauchi
Japan
On the Number of 5-variable Best Boolean Functions
Min Xie and Dingyi Pei
China Session
3T: Secure Multicast
Improving Performance of Multicast Rekeying by Combining Broadcast Encryption
with Optimal Key Storage
Josep Pegueroles and Francisco Rico-Novella
Spain
The use of TCP Unicast Packet for Reliable Multicast
Kyu-Tae Oh, Won-Hyuck Choi, and Jung-Sun Kim
Korea
Session Key Generation for Secure Electronic Transaction
Ismail Jabiullah, Mizanur Rahman, and Lutfar Rahman
Bangladesh
Session 4T:
Secure Electronic Commerce
A Security and Payment Scheme for Cooperative Distributed Search Engines
Kan Wang and Ahmed Patel
Ireland
An English Auction Scheme in the Secure Network Environment
Tzer-Shyong Chen, Kuo-Hsuan Huang, Jen-Yan Huang, and Tzer-Lung
Chen
Taiwan
Secure Multiple Mobile Payment Protocol
Shinyoung Lim and Youjin Song
Korea
Session 5T: Cryptographic Applications
Usage of LCG/CLC Numbers for Electronic Gambling Applications
Anders Knutsson
Sweden
Zero-knowledge Proof System vs Asymmetric Cryptosystem, Symmetric Cryptosystem
Chunming Tang, Zhuojun Liu, and Mingsheng Wang
China
A Stronger Rule Description Language than Snort’s
Dihua Liu, Jiali Song, Feng Liu, and Miao Li
China
Session 6T:
Invited Speech
Implementation of Virtual-Optics Encryption with a DSP Scheme
Xiang Peng, Peng Zhang, Xiaofeng Li, and Hanben Niu
China
Session 7T:
Intrusion Detection and Prevention
Intrusion Prevention: Modelling and Simulation for Fast Detection
of DDoS Attacks
M.W. David, S. Chatterjee, P. Sarkar, and K. Sakurai
Singapore / Japan
An
Intelligent Model of Intrusion Detection and Response using Mobile Agent
Jianbiao Zhang and Chuangbai Xiao
China
Probe into Firewall Technology
Yanfeng Suo, Yanchun Feng, and Shiyao Ma
China
Session 8T:
Security Framework A
Framework for Network Security Assurance
Chunfang Jiang
China
A Framework of Consolidated Authorization Management in e-SCM
Seung-Phil Hong, Myung-Chul
Kim, Kwangjo Kim, and Jinho Kim
Korea
A Method for Analyzing and Evaluating PKI Products and Their Technology
Gang Lian, Teemupekka Virtanen, and Ronja Addams-Moring
Finland
Session 9T: Digital
Right Management
A Novel System for Content Protection in Home Environment
Zheng Yan and Peng Zhang
Finland
CodeMeter:
Digital Rights Management for Protection and Measurment of Use of Software
Oliver Winzenried and Hailiang Li
Germany / China