ACM Symposium on Information, Computer & Communication Security (ASIACCS '08)
Akihabara Convention Hall, Tokyo, 18-20 March 2008
ASIACCS '08 Top > Accepted Papers

Accepted Papers

Regular Papers (34)

Title: Detecting VoIP based DoS attacks at the Public Safety Answering Point
Authors: Christoph Fuchs, Nils Aschenbruck, Felix Leder and Peter Martini
Affiliations: University of Bonn and Institute of Computer Science IV

Title: A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search
Authors: Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro and Kazuo Ohta
Affiliations: FUJITSU LABORATORIES LTD., Chuo University, and The University of Electro-Communications

Title: An Overview of Side Channel Analysis Attacks
Authors: Thanh-Ha Le, Cecile Canovas and Jessy Clediere
Affiliations: CEA LETI

Title: On Spatio-Temporal Constraints and Inheritance in Role-Based Access Control
Authors: Liang Chen and Jason Crampton
Affiliations: University of London, Royal Holloway

Title: Online Subscriptions with Anonymous Access
Author: Marina Blanton
Affiliation: University of Notre Dame

Title: On the Protocol Composition Logic PCL
Authors: Cas Cremers
Affiliations: ETH Zurich

Title: Robust, Anonymous RFID Authentication with Constant Key-Lookup
Authors: Mike Burmester, Breno de Medeiros and Rossana Motta
Affiliations: Florida State University, Tallahassee

Title: Non-Interactive Conference Key Distribution and Its Applications
Authors: Rei Safavi-Naini and Shaoquan Jiang
Affiliations: University of Calgary

Title: Mutual Authentication in RFID: Security and Privacy
Authors: Radu-Ioan Paise and Serge Vaudenay
Affiliations: EPFL

Title: Towards an Efficient and Language-Agnostic Compliance Checker for Trust Negotiation Systems
Authors: Adam J. Lee and Marianne Winslett
Affiliations: University of Illinois at Urbana-Champaign

Title: Efficient Designated Confirmer Signature from Bilinear Pairings
Authors: Fangguo Zhang, Xiaofeng Chen and Baodian Wei
Affiliations: Sun Yat-Sen Universit

Title: Securing Group Key Exchange against Strong Corruptions
Authors: Emmanuel Bresson and Mark Manulis
Affiliations: DCSSI and UCL Crypto Group

Title: Private Combinatorial Group Testing
Authors: Mikhail Atallah, Keith Frikken, Marina Blanton, Younsun Cho
Affiliations: Purdue University, Miami University and University of Notre Dame

Title: An Integrated Framework for Security Protocol Analysis
Authors: Marcin Olszewski and Lukasz Cyra
Affiliations: Microsoft Corporation and Gdansk University of Technology

Title: Exploiting Social Networks for Threshold Signing: Attack-resilience vs. Availability
Authors: Shouhuai Xu, Xiaohu Li and Paul Parker
Affiliations: University of Texas, San Antonio

Title: Stateful Identity-Based Encryption Scheme: Faster Encryption and Decryption
Authors: Le Trieu Phong, Hiroto Matsuoka, and Wakaha Ogata
Affiliations: Tokyo Institute of Technology

Title: Secure Neighbor Discovery in Wireless Networks: Is It Possible?
Authors: Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
Affiliations: EPFL

Title: Secure Slices of Insecure Programs
Authors: Salvador V. Cavadini
Affiliations: INRIA

Title: Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
Authors: Alfred Menezes and Berkant Ustaoglu
Affiliations: University of Waterloo

Title: Avoiding Timing Channels in Fixed-Priority Schedulers
Authors: Marcus Völp, Claude-Joachim Hamann, Hermann Härtig
Affiliations: TU-Dresden

Title: Practical Forward Secure Aggregate Signatures
Authors: Di Ma
Affiliations: University of California, Irvine

Title: Provably Secure Browser-Based User-Aware Mutual Authentication over TLS
Authors: Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi and Jörg Schwenk
Affiliations: Horst Gortz Institute for IT-Security and UCL Crypto Group

Title: Principled Reasoning and Practical Applications of Alert Fusion in Intrusion Detection Systems
Authors: Guofei Gu, Alvaro A. Cardenas, and Wenke Lee
Affiliations: Georgia Tech. and UC Berkeley

Title: Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)
Authors: Lei WANG, Kazuo OHTA, and Noboru KUNIHIRO
Affiliations: The University of Electro-Communications

Title: A Practical Mimicry Attack Against Powerful System-Call Monitors
Authors: C. Parampalli, R. Sekar and Rob Johnson
Affiliations: Stony Brook University

Title: Analysis of a General Probabilistic Packet Marking Model for IP Traceback
Authors: Liming Lu and Mun Choon Chan and Ee-Chien Chang
Affiliations: National University of Singapore

Title: Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
Authors: Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezuka and Danfeng Yao
Affiliations: HP, Hitachi, Hitachi, HP, Hitachi, HP, Hitachi and Brown University

Title: CMV: Automatic Verification of Complete Mediation for Java Virtual Machines
Authors: Michelle Zhou, V.N. Venkatakrishnan, A. Prasad Sistla, Hilary Branske
Affiliations: University of Illinois at Chicago

Title: A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key
Authors: C. Petit, F.-X. Standaert, O. Pereira, T.G. Malkin, M. Yung
Affiliations: UCL Crypto Group and Columbia University

Title: Verified Implementations of the Information Card Federated Identity-Management Protocol
Authors: Karthik Bhargavan, Cedric Fournet, Andrew Gordon, Nikhil Swamy
Affiliations: Microsoft Research and University of Maryland, College Park

Title: HMAC is a Randomness Extractor and Applications to TLS
Authors: Pierre-Alain Fouque, David Pointcheval and Sebastien Zimmer
Affiliations: Ecole normale superieure

Title: SNAPP: Stateless Network-Authenticated Path Pinning
Authors: Bryan Parno, Adrian Perrig and David Andersen
Affiliations: Carnegie Mellon University

Title: Cryptanalysis and Improvement of a Multi-receiver Identity-Based Key Encapsulation at INDOCRYPT 06
Authors: Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee
Affiliations: Korea University

Title: Computationall Sound Mechanized Proof for Basic and Public-Key Kerberos
Authors: Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
Affiliations: Ecole Normale Superieur, Rutgers University and University of Pennsylvania

Short Papers (6)

Title: Certificateless Signcryption
Authors: M. Barbosa and P. Farshim
Affiliations: Universidade do Minho and University of Bristol

Title: A Short Anonymously Revocable Group Signature Scheme from Decision Linear Assumption
Authors: Toru Nakanishi, Nobuo Funabiki
Affiliations: Okayama University

Title: Mechanisms for Usage Control
Authors: Alexander Pretschner, Manuel Hilty, Christian Schaefer, Thomas Walter and David Basin
Affiliations: ETH Zurich and DoCoMo EuroLabs

Title: SEAR: A Secure Efficient Ad Hoc On Demand Routing Protocol for Wireless Networks
Authors: Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig and Wade Trappe
Affiliations: Rutgers University, Intel Corporation, UIUC and CMU

Title: Controlled Privacy Preserving Keyword Search
Authors: Stephen S. Yau, Yin Yin
Affiliations: Arizona State University

Title: Usage Control Platformization via Trustworthy SELinux
Authors: Xinwen Zhang, Masoom Alam, Jean-Pierre Seifert, Qi Li
Affiliations: Samsung Information Systems America, University of Innsbruck and Tsinghua University