Session 1.
Digital
Signatures (Chair: Lein Harn)
Cao Jianneng
and Qi Ming
Zhao Zemao and Liu Fengyu
Session 2.
Invited Talk (Chair: Yongfei
Han)
Exploiting Side Information
David Naccache
Session 3.
Cryptographic
Applications and Implementations
(Chair: Willy Susilo)
Lein Harn
and Jian Wang and Hideki Imai
Delong Shang and Frank
Burns and Albert Koelmans and Alex Yakovlev
A Fast Java Implementation
of a Provably Secure Pseudo Random Bit Generator Based on the Elliptic Curve
Discrete Logarithm Problem
Harald Baier
Qiang Liu and Fangzhen
Ma and Dong Tong and Xu Cheng
Session
4. Authenticated
Key Exchange (Chair:
Integrated Key Exchange Protocol Capable of Revealing Spoofing and Resisting Dictionary Attacks
David Lai and Zhongwei
Zhang
Rui Jiang
and Li Pan and Jian-Hua Li
Yuen-Yan Chan and Tony K.
Chan and Karyin Fung and
Joseph K. Liu and Duncan S. Wong
Zhaohui Cheng
Session
5. Image
and Watermarking Security (Chair: Rafael Marin Lopez)
A New Adaptive Audio Digital Watermarking Blind Algorithm Based on Human Auditory System
Rang-Ding Wang and Gang-Yi Jiang
and Da-Wen Xu and Deng-Ke Chen and Bing Zhu
Chin-Chen Chang and Hsien-Wen Tseng
Gui Xie and Hong Shen
Sung-kwan Je and Jae-Hyun Cho and Eui-young Cha
Xia Xiaoqing
and Feng Wei and Zhao Rongchun
Session 6.
Authentication
(Chair: David Lai)
Li Tang
Kun-Yuan Chen and Tin-Wei Chang and Yao-Chang Yu and Chi-Sung Laih
Design and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform
Young-Gab Kim and
Verifying Server Computation
Lea Kissner and Dawn Song
Session 7.
Intrusion
Detection and Defense (Chair: Dong Yu)
Wang Xuren and Xu Rongsheng
Martin Naedele and Oliver Biderbost
Xu Hui and Pan Aimin
Byung-Gil Min and Jong Kim and Sung-Je Hong
Wang Yin and Teemupekka Virtanen
Session
8. System
Security (Chair: Martin Naedele)
Liwen He and Meena
Laitinen
Juhou He and Xiuqing
He and Weihua Li
Detection for Buffer Overflow Software Security Vulnerability Using Function Call Sequence Graph Analysis
Won-ho Kim and Jong Kim and Sung-je
Hong
Multivariate Statistical Short-Term Hybrid Prediction Modeling for Database Anomaly Intrusion Prediction System
P. Ramasubramanian and A.Kannan
Session 9.
Security
Framework and Modelling (Chair: Muxiang
Zhang)
Cungang Yang
Teng Lv
and Ping Yan and Zhenxing
Wang
Jianxin Wang and Geng Zhao
and Wei Wei and Peng Ye
Antonio F. Gomez Skarmeta
and Gregorio
Session 10.
Cryptographic
Algorithms and Protocols (Chair: Joseph Liu)
Yvo G. Desmedt
and Mahesh K. Patel
Asad Amir
Pirzada and Chris McDonald
A New Efficient Polynomial Degree Resolution Protocol and Its Applications to the (M+1)-st Price Private Auction
A. T. Chronopoulos and D. Grosu and H. Kikuchi
Shinsaku Kiyomoto
and Toshiaki Tanaka and Koichi Sakurai
Session
11. Network
Security (Chair: Bok-Min Goi)Choong Seon
Hong and
Cheng Zhi'an and Luo Xiaoning and Jiang Xiaolan
Gao Ling and Li Jiajun and Zhu Jin
Wang Haiyan and Zhang Jianliang and Liuqian
Ali Bakhtiar Nizamani and Jamalul-lail Abdul Manan
Session 12.
Miscellaneous
(Chair: Liwen He)
Michelangelo Giansiracusa
and Selwyn Russell and Andrew Clark
Manshan Lin and Heqing
Guo
Joseph K. Liu and Sandy H. Wong and Duncan S. Wong
Younglok Lee and
Information Exchange Using the Ergodic Matrices in GF(2)
Zhao Yongzhe and Wang Liou and Zhang Wei