Accepted Papers
Regular Papers (34)
Title: Detecting VoIP based DoS attacks at the Public Safety Answering Point
Authors: Christoph Fuchs, Nils Aschenbruck, Felix Leder and Peter Martini
Affiliations: University of Bonn and Institute of Computer Science IV
Title: A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search
Authors: Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro and Kazuo Ohta
Affiliations: FUJITSU LABORATORIES LTD., Chuo University, and The University of Electro-Communications
Title: An Overview of Side Channel Analysis Attacks
Authors: Thanh-Ha Le, Cecile Canovas and Jessy Clediere
Affiliations: CEA LETI
Title: On Spatio-Temporal Constraints and Inheritance in Role-Based Access Control
Authors: Liang Chen and Jason Crampton
Affiliations: University of London, Royal Holloway
Title: Online Subscriptions with Anonymous Access
Author: Marina Blanton
Affiliation: University of Notre Dame
Title: On the Protocol Composition Logic PCL
Authors: Cas Cremers
Affiliations: ETH Zurich
Title: Robust, Anonymous RFID Authentication with Constant Key-Lookup
Authors: Mike Burmester, Breno de Medeiros and Rossana Motta
Affiliations: Florida State University, Tallahassee
Title: Non-Interactive Conference Key Distribution and Its Applications
Authors: Rei Safavi-Naini and Shaoquan Jiang
Affiliations: University of Calgary
Title: Mutual Authentication in RFID: Security and Privacy
Authors: Radu-Ioan Paise and Serge Vaudenay
Affiliations: EPFL
Title: Towards an Efficient and Language-Agnostic Compliance Checker for Trust Negotiation Systems
Authors: Adam J. Lee and Marianne Winslett
Affiliations: University of Illinois at Urbana-Champaign
Title: Efficient Designated Confirmer Signature from Bilinear Pairings
Authors: Fangguo Zhang, Xiaofeng Chen and Baodian Wei
Affiliations: Sun Yat-Sen Universit
Title: Securing Group Key Exchange against Strong Corruptions
Authors: Emmanuel Bresson and Mark Manulis
Affiliations: DCSSI and UCL Crypto Group
Title: Private Combinatorial Group Testing
Authors: Mikhail Atallah, Keith Frikken, Marina Blanton, Younsun Cho
Affiliations: Purdue University, Miami University and University of Notre Dame
Title: An Integrated Framework for Security Protocol Analysis
Authors: Marcin Olszewski and Lukasz Cyra
Affiliations: Microsoft Corporation and Gdansk University of Technology
Title: Exploiting Social Networks for Threshold Signing: Attack-resilience vs. Availability
Authors: Shouhuai Xu, Xiaohu Li and Paul Parker
Affiliations: University of Texas, San Antonio
Title: Stateful Identity-Based Encryption Scheme: Faster Encryption and Decryption
Authors: Le Trieu Phong, Hiroto Matsuoka, and Wakaha Ogata
Affiliations: Tokyo Institute of Technology
Title: Secure Neighbor Discovery in Wireless Networks: Is It Possible?
Authors: Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
Affiliations: EPFL
Title: Secure Slices of Insecure Programs
Authors: Salvador V. Cavadini
Affiliations: INRIA
Title: Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
Authors: Alfred Menezes and Berkant Ustaoglu
Affiliations: University of Waterloo
Title: Avoiding Timing Channels in Fixed-Priority Schedulers
Authors: Marcus Völp, Claude-Joachim Hamann, Hermann Härtig
Affiliations: TU-Dresden
Title: Practical Forward Secure Aggregate Signatures
Authors: Di Ma
Affiliations: University of California, Irvine
Title: Provably Secure Browser-Based User-Aware Mutual Authentication over TLS
Authors: Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi and Jörg Schwenk
Affiliations: Horst Gortz Institute for IT-Security and UCL Crypto Group
Title: Principled Reasoning and Practical Applications of Alert Fusion in Intrusion Detection Systems
Authors: Guofei Gu, Alvaro A. Cardenas, and Wenke Lee
Affiliations: Georgia Tech. and UC Berkeley
Title: Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)
Authors: Lei WANG, Kazuo OHTA, and Noboru KUNIHIRO
Affiliations: The University of Electro-Communications
Title: A Practical Mimicry Attack Against Powerful System-Call Monitors
Authors: C. Parampalli, R. Sekar and Rob Johnson
Affiliations: Stony Brook University
Title: Analysis of a General Probabilistic Packet Marking Model for IP Traceback
Authors: Liming Lu and Mun Choon Chan and Ee-Chien Chang
Affiliations: National University of Singapore
Title: Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
Authors: Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezuka and Danfeng Yao
Affiliations: HP, Hitachi, Hitachi, HP, Hitachi, HP, Hitachi and Brown University
Title: CMV: Automatic Verification of Complete Mediation for Java Virtual Machines
Authors: Michelle Zhou, V.N. Venkatakrishnan, A. Prasad Sistla, Hilary Branske
Affiliations: University of Illinois at Chicago
Title: A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key
Authors: C. Petit, F.-X. Standaert, O. Pereira, T.G. Malkin, M. Yung
Affiliations: UCL Crypto Group and Columbia University
Title: Verified Implementations of the Information Card Federated Identity-Management Protocol
Authors: Karthik Bhargavan, Cedric Fournet, Andrew Gordon, Nikhil Swamy
Affiliations: Microsoft Research and University of Maryland, College Park
Title: HMAC is a Randomness Extractor and Applications to TLS
Authors: Pierre-Alain Fouque, David Pointcheval and Sebastien Zimmer
Affiliations: Ecole normale superieure
Title: SNAPP: Stateless Network-Authenticated Path Pinning
Authors: Bryan Parno, Adrian Perrig and David Andersen
Affiliations: Carnegie Mellon University
Title: Cryptanalysis and Improvement of a Multi-receiver Identity-Based Key Encapsulation at INDOCRYPT 06
Authors: Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee
Affiliations: Korea University
Title: Computationall Sound Mechanized Proof for Basic and Public-Key Kerberos
Authors: Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
Affiliations: Ecole Normale Superieur, Rutgers University and University of Pennsylvania
Short Papers (6)
Title: Certificateless Signcryption
Authors: M. Barbosa and P. Farshim
Affiliations: Universidade do Minho and University of Bristol
Title: A Short Anonymously Revocable Group Signature Scheme from Decision Linear Assumption
Authors: Toru Nakanishi, Nobuo Funabiki
Affiliations: Okayama University
Title: Mechanisms for Usage Control
Authors: Alexander Pretschner, Manuel Hilty, Christian Schaefer, Thomas Walter and David Basin
Affiliations: ETH Zurich and DoCoMo EuroLabs
Title: SEAR: A Secure Efficient Ad Hoc On Demand Routing Protocol for Wireless Networks
Authors: Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig and Wade Trappe
Affiliations: Rutgers University, Intel Corporation, UIUC and CMU
Title: Controlled Privacy Preserving Keyword Search
Authors: Stephen S. Yau, Yin Yin
Affiliations: Arizona State University
Title: Usage Control Platformization via Trustworthy SELinux
Authors: Xinwen Zhang, Masoom Alam, Jean-Pierre Seifert, Qi Li
Affiliations: Samsung Information Systems America, University of Innsbruck and Tsinghua University