Eighth International Conference on Information and Communications Security (ICICS '06)

Accepted Papers

A CONSTRUCTION FOR GENERAL AND EFFICIENT OBLIVIOUS COMMITMENT BASED
ENVELOPE PROTOCOLS
Jiangtao Li and Ninghui Li (Purdue University)

A FAST RSA IMPLEMENTATION ON ITANIUM 2 PROCESSOR
Kazuyoshi FURUKAWA and Masahiko TAKENAKA

A ROBUST AND SECURE RFID-BASED TRACKING SYSTEM (SHORT PAPER)
Chiu Tan and Qun Li

A SECURITY ANALYSIS OF THE PRECISE TIME PROTOCOL (SHORT PAPER)
Jeanette Sin Mei Tsang and Konstantin Beznosov

A TOPOLOGICAL CONDITION FOR SOLVING FAIR EXCHANGE IN BYZANTINE
ENVIRONMENTS
Benoît Garbinato and Ian Rickebusch

A WIRELESS COVERT CHANNEL ON SMART CARDS (SHORT PAPER)
Geir Olav Dyrkolbotn and Einar Snekkenes

AN ANONYMOUS AUTHENTICATION SCHEME FOR IDENTIFICATION CARD
He Ge (Microsoft)

AN ATTACK ON SMC-BASED SOFTWARE PROTECTION
Yongdong Wu, Zhigang Zhao and Tian Wei Chui

AN ENHANCED N-WAY EXCHANGE-BASED INCENTIVE SCHEME FOR P2P FILE SHARING (SHORT PAPER)
Lingli Deng, Yeping He, Ziyao Xu and Chunyang Yuan

AN IDENTITY-BASED PROXY SIGNATURE SCHEME FROM PAIRINGS
Kyung-Ah Shim

AN INDEPENDENT FUNCTION-PARALLEL FIREWALL ARCHITECTURE FOR HIGH-SPEED
NETWORKS (SHORT PAPER)
Errin Fulp

AN OPERATING SYSTEM DESIGN FOR THE SECURITY ARCHITECTURE FOR
MICROPROCESSORS
Jörg Platte, Raúl Durán Díaz and Edwin Naroska

CRYPTANALYSIS OF ID-BASED AUTHENTICATED KEY AGREEMENT PROTOCOLS FROM
BILINEAR PAIRINGS (SHORT PAPER)
Kyung-Ah Shim

CRYPTANALYSIS OF TIMESTAMP-BASED PASSWORD AUTHENTICATION SCHEMES USING
SMART CARDS
Guilin Wang and Feng Bao

DEFINING AND MEASURING POLICY COVERAGE IN TESTING ACCESS CONTROL
POLICIES
Evan Martin, Tao Xie and Ting Yu

DISTRIBUTED CREDENTIAL CHAIN DISCOVERY IN TRUST MANAGEMENT WITH
PARAMETERIZED ROLES AND CONSTRAINTS (SHORT PAPER)
Ziqing Mao, Ninghui Li and William H. Winsborough

EFFICIENT IMPLEMENTATION OF PUBLIC KEY CRYPTOSYSTEMS ON MICAZ SENSOR
MOTES (SHORT PAPER)
Haodong Wang and Qun Li

EFFICIENT PROTECTION AGAINST HEAP-BASED BUFFER OVERFLOWS WITHOUT
RESORTING TO MAGIC
Yves Younan, Wouter Joosen and Frank Piessens

EFFICIENT PROTOCOLS FOR PRIVACY PRESERVING MATCHING AGAINST DISTRIBUTED
DATASETS
Yingpeng Sang, Hong Shen, Yasuo Tan and Naixue Xiong

ESTIMATING ACCURACY OF MOBILE-MASQUERADER DETECTION USING WORST-CASE
AND BEST-CASE SCENARIO
Oleksiy Mazhelis, Seppo Puuronen and Mika Raento

FINDING COMPACT RELIABLE BROADCAST COMMUNICATIONS IN UNKNOWN
FIXED-IDENTITY NETWORKS (SHORT PAPER)
Huafei Zhu and Jianying Zhou

FORMAL ANALYSIS AND SYSTEMATIC CONSTRUCTION OF TWO-FACTOR
AUTHENTICATION SCHEME (SHORT PAPER)
Guomin Yang, Duncan S. Wong, Huaxiong Wang and Xiaotie Deng

FROM PROXY ENCRYPTION PRIMITIVES TO A DEPLOYABLE SECURE-MAILING-LIST
SOLUTION
Himanshu Khurana, Jin Heo and Meenal Pant (National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign)

GENERALIZATION AND IMPROVEMENTS TO $\TAU$-ADIC JOINT SPARSE FORM (SHORT PAPER)
Billy Bob Brumley

HARDWARE-AND-SOFTWARE-BASED SECURITY ARCHITECTURE FOR BROADBAND ROUTER (SHORT PAPER)
Xiaozhuo GU, Yufeng LI, Jianzu YANG and Julong LAN

HIERARCHICAL KEY ASSIGNMENT FOR BLACK-BOX TRACING WITH EFFICIENT
CIPHERTEXT SIZE
Tatsuyuki MATSUSHITA and Hideki IMAI

MATHEMATICAL FOUNDATIONS FOR THE DESIGN OF A LOW-RATE DOS ATTACK TO
ITERATIVE SERVERS (SHORT PAPER)
Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo and Pedro García-Teodoro

MODULAR BEHAVIOR PROFILES IN SYSTEMS WITH SHARED LIBRARIES (SHORT PAPER)
Carla Marceau and Matt Stillerman

POINT-BASED TRUST: DEFINE HOW MUCH PRIVACY IS WORTH
Danfeng Yao, Keith Frikken, Mikhail Atallah and Roberto Tamassia

PRECISE INFORMATION FLOW CONTROL THROUGH RUNTIME ENFORCEMENT
V.N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney and R Sekar

QUANTIFYING INFORMATION LEAKAGE IN TREE-BASED HASH PROTOCOLS (SHORT PAPER)
Karsten Nohl and David Evans

SECURE SET MEMBERSHIP USING 3SAT
Michael de Mare and Rebecca Wright

SEIFERT'S RSA FAULT ATTACK: SIMPLIFIED ANALYSIS AND GENERALIZATIONS
James Muir

STRONG AND ROBUST RFID AUTHENTICATION ENABLING PERFECT OWNERSHIP
TRANSFER
Chae Hoon Lim and Taekyoung Kwon

THE FAIRNESS OF PERFECT CONCURRENT SIGNATURES
Guilin Wang, Feng Bao and Jianying Zhou

THRESHOLD IMPLEMENTATIONS AGAINST SIDE-CHANNEL ATTACKS AND GLITCHES
Vincent Rijmen, Svetla Nikova and Christian Rechberger

TRACE-DRIVEN CACHE ATTACKS ON AES (SHORT PAPER)
Onur Aciicmez and Cetin Kaya Koc

TRACING HTTP ACTIVITY THROUGH NON-COOPERATING HTTP PROXIES (SHORT
PAPER)
Richard Edell and Pete Kruus

UNIVERSAL DESIGNATED VERIFIER SIGNATURE WITHOUT DELEGATABILITY
Xinyi Huang, Willy Susilo and Yi Mu

©2006 Peng Ning . All rights reserved.