© 2008

Advances in Information and Computer Security

Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

  • Kanta Matsuura
  • Eiichiro Fujisaki
Conference proceedings IWSEC 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5312)

Table of contents

  1. Front Matter
  2. Cryptography

    1. Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe
      Pages 20-33
    2. Naoki Ogura, Shigenori Uchiyama
      Pages 34-48
  3. Signature and Signcryption

  4. Software Security

    1. Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei (Nick) Saw, Ramarathnam Venkatesan
      Pages 100-120
    2. Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han
      Pages 121-135
    3. Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis
      Pages 136-151
    4. Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 152-166
  5. Privacy Protection and Contents Protection

    1. Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen
      Pages 167-183
    2. Cyril Bazin, Jean-Marie Le Bars, Jacques Madelaine
      Pages 201-217
  6. Invited Talk

  7. Authentication and Access Control

    1. Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer
      Pages 219-230
    2. Dong Chan An, So Mi Park, Seog Park
      Pages 246-260
  8. Implementation

    1. Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda
      Pages 261-278
    2. Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
      Pages 279-297

About these proceedings


This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008.

The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on cryptography, signature and signcryption, software security, privacy protection and contents protection, authentication and access control, as well as implementation.


access control anomaly detection authentication behavior profiling biometric data certification computer security cryptanalysis cryptographic protocols data security dynamic XML group signature information leakage information s security algorithm analysis and problem complexity

Editors and affiliations

  • Kanta Matsuura
    • 1
  • Eiichiro Fujisaki
    • 2
  1. 1.Institute of Industrial ScienceUniversity of TokyoTokyoJapan
  2. 2.NTT Information Sharing Platform LaboratoriesNTT CorporationJapan

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment