Advertisement

© 2009

Emerging Challenges for Security, Privacy and Trust

24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings

  • Dimitris Gritzalis
  • Javier Lopez
Conference proceedings SEC 2009

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 297)

Table of contents

  1. Front Matter
  2. Identification and Authentication I

    1. Nathan Clarke, Sevasti Karatzouni, Steven Furnell
      Pages 1-12
    2. Yannis Soupionis, George Tountas, Dimitris Gritzalis
      Pages 25-38
  3. Threats and Attacks

    1. Lucas Nussbaum, Pierre Neyron, Olivier Richard
      Pages 51-62
    2. Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar Iyer
      Pages 63-75
  4. Identification and Authentication II

    1. Gerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl
      Pages 76-86
    2. Marcel Fernandez, Josep Cotrina, Miguel Soriano, Neus Domingo
      Pages 87-97
    3. Li Yao, Ning Zhang
      Pages 98-108
  5. Applications of Cryptography and Information Hiding

    1. Herbert Leitold, Reinhard Posch, Thomas Rössler
      Pages 109-118
    2. Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
      Pages 119-131
    3. Jorge Blasco, Julio C. Hernandez-Castro, Juan M. E. Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros
      Pages 132-142
  6. Trusted Computing

    1. Shay Gueron, Jean-Pierre Seifert
      Pages 143-151
    2. Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt
      Pages 152-163
  7. Security Policies

    1. Anas Abou El Kalam, Philippe Balbiani
      Pages 176-189
  8. Validation, Verification, Evaluation

    1. Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph
      Pages 190-201
    2. Puneet Gupta, Scott D. Stoller
      Pages 202-213
    3. Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag
      Pages 214-225

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009,  held in Pafos, Cyprus, in May 2009.

The 38 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers are organized in topical sections on identification and authentication, threats and attacks, applications of cryptography and information hiding, trusted computing, security policies, validation, verification and evaluation, privacy protection and security assessment, role mining and content protection, security protocols, access control, and internet and Web applications security.

Keywords

Trusted Computing ad-hoc networks botnet protocols cryptanalysis data security egovernment encryption esignatures information intrusion detection iris recognition mobile networking privacy steganalysis voip

Editors and affiliations

  • Dimitris Gritzalis
    • 1
  • Javier Lopez
    • 2
  1. 1.Information Security and Infrastructure Protection Research Group, Dept. of InformaticsAthens University of Economics and BusinessAthensGreece
  2. 2.Computer Science Department, E.T.S.I. InformaticaUniversity of MalagaMalagaSpain

Bibliographic information

  • Book Title Emerging Challenges for Security, Privacy and Trust
  • Book Subtitle 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
  • Authors Dimitris Gritzalis
    Javier Lopez
  • Series Title IFIP Advances in Information and Communication Technology
  • DOI https://doi.org/10.1007/978-3-642-01244-0
  • Copyright Information IFIP International Federation for Information Processing 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Hardcover ISBN 978-3-642-01243-3
  • Softcover ISBN 978-3-642-10176-2
  • eBook ISBN 978-3-642-01244-0
  • Series ISSN 1868-4238
  • Series E-ISSN 1868-422X
  • Edition Number 1
  • Number of Pages XIV, 444
  • Number of Illustrations 0 b/w illustrations, 0 illustrations in colour
  • Topics Computer Communication Networks
    Systems and Data Security
    Cryptology
    Data Structures and Information Theory
  • Buy this book on publisher's site
Industry Sectors
Automotive
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Pharma
Materials & Steel
Finance, Business & Banking
Electronics
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering