By Topic

2012 9th International ISC Conference on Information Security and Cryptology

13-14 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 41
  • [Front cover]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (24822 KB)
    Freely Available from IEEE
  • [Spine]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (253 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (203 KB) | HTML iconHTML
    Freely Available from IEEE
  • About conference

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Program committee

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (201 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (230 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (365 KB)
    Freely Available from IEEE
  • Generalization of statistical criteria for Sboxes

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Linear cryptanalysis is one of the most important tools in the analysis of symmetric ciphers. This attack makes use of linear properties of Sboxes. In this paper, we investigate the linear properties of Sboxes, mathematically, and generalize the criteria used in linear attacks in two aspects: the first aspect introduces nonlinear criteria for Sboxes; the second aspect is generalizing linear criter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical properties of modular multiplication modulo a power of two

    Publication Year: 2012, Page(s):6 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    In this paper, we investigate statistical properties of modular multiplication modulo a power of two. In fact, we obtain the distribution of every single bit of modular multiplication. Moreover, we determine the distribution of modular multiplication as a vectorial Boolean function. Then, the joint distribution of modular multiplication component bits is discussed: an explicit formula in the case ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic, zero-message broadcast encryption scheme based on secure multiparty computation

    Publication Year: 2012, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    In this paper we present a new broadcast encryption scheme based on threshold secret-sharing and secure multiparty computation which has three main features: It is zero-message, this means that it does not require any special message to be sent from center to users in order to setup communication. Just one step of user registration is required and no further messages are required to be sent. It is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new image steganography based on denoising methods in wavelet domain

    Publication Year: 2012, Page(s):18 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1010 KB) | HTML iconHTML

    This paper introduces a novel wavelet-based method to perform image steganography utilizing image denoising algorithms by wavelet thresholding. Steganographic algorithms are in general based on replacing noise components of a digital object with a to-be-hidden message. The main motivation for conducting this research was to improve robustness and capacity of hidden data due to efficacy of wavelet ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication based on signature verification using position, velocity, acceleration and Jerk signals

    Publication Year: 2012, Page(s):26 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Signature verification techniques utilize many different characteristics of an individual. The selection of signature features is critical in determining the performance of a signature verification system. Even though it is critical to select a suitable set of features to be extracted, emphasis has to be put into selecting an appropriate classifier for the features selected. This paper evaluates 1... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ID-based key agreement protocol based on ECC among users of separate networks

    Publication Year: 2012, Page(s):32 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    This paper proposes an identity based key agreement protocol based on elliptic curve cryptography (ECC) between users of different networks with independent private key generations (PKGs). Instead of bilinear pairings which commonly used for contracting identity based schemes, the proposed protocol makes use of elliptic curves to obtain more computational efficiency. The proposed protocol develops... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improvement of image secret sharing and hiding with authentication

    Publication Year: 2012, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1270 KB) | HTML iconHTML

    In recent years, researchers has proposed (t, n)-threshold image secret sharing and hiding schemes with authentication. The secret image is shared and hided into typical cover images to form the stego images so that to be transmitted securely. Unfortunately, there is a common week point that each stego image should be extended to 4/t times of the secret image. Recently, a (t, n)-threshold image se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mutual implementation of predefined and random challenges over RFID distance bounding protocol

    Publication Year: 2012, Page(s):43 - 47
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (689 KB) | HTML iconHTML

    Distance bounding protocols are launched based upon the round trip time measurements of the carried out messages to defend RFID systems against the relay attack. In such protocols, the reader authenticates tags and also estimates an upper bound for the physical distance between the tag and itself. Distance bounding protocols are vulnerable to mafia fraud and distance fraud attacks. In this paper, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy specification and enforcement in online social networks using MKNF+

    Publication Year: 2012, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    Emerging tools that ease sharing information in online social networks (OSNs) can cause various privacy issues for users. Access control is the main security mechanism in OSNs which is used to tackle such issues. In this paper, a prioritized ontology based access control model for protecting users' information in OSNs is proposed. In the proposed model, description logic (DL) is used for modeling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic malware detection using registers values set analysis

    Publication Year: 2012, Page(s):54 - 59
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    The number of Malicious files increase every day because of existing open source malware and obfuscation techniques. It means that traditional signature-based techniques are not adequate for detecting new variant of malware. Researchers and anti malware companies recently focus on more advanced protection which needs influential pattern extraction techniques. In this paper, a novel method is propo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified dual watermarking scheme for digital images with tamper localization/detection and recovery capabilities

    Publication Year: 2012, Page(s):60 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1573 KB) | HTML iconHTML

    The privacy and integrity protection of digital documents specially the case of biomedical images is a vital subject in the current world of telecommunication and digital multimedia exchanges. In this paper, a modified semi robust digital image watermarking method with tamper detection and recovery ability is proposed. For this purpose, the proposed method comprises two stages. In the first stage,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using user similarity to infer trust values in social networks regardless of direct ratings

    Publication Year: 2012, Page(s):66 - 72
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Social networks recently get more attention on the Internet. Although they were introduced to facilitate relationships, now users may utilize them to get services such as experts' consultancy and marketing. Anyhow, users need a somehow proper estimation of trust in other users to make better decisions. Some trust evaluation mechanisms, which use direct ratings to calculate or propagate trust value... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient end to end key establishment protocol for wireless sensor networks

    Publication Year: 2012, Page(s):73 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    Sensor networks are suitable candidates for military and scientific applications such as border security and environmental monitoring. They are usually deployed in unattended or hostile environments so security is a major concern with these networks. A fundamental requirement is the capability to establish pairwise keys between sensors. Many key establishment protocols have been proposed to addres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring software security using SAN models

    Publication Year: 2012, Page(s):80 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    Security is one of the important issues in developing and implementing software systems especially in highly critical applications. Quantification and measurement of security is one of the approaches adopted to achieve the desired degree of security. In this paper, Stochastic Activity Networks (SANs) are used to formally model the attacks on the system under investigation. To this end, the semi-Ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-monotonocity in OrBAC through default and exception policy rules

    Publication Year: 2012, Page(s):87 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    Context-awareness is an essential requirement of modern access control models. Organization-Based Access Control (OrBAC) model is a powerful context-aware access control model defined by first-order logic. However, due to the monotonicity nature of the first-order logic, OrBAC suffers from the incapability of making decision based on incomplete context information as well as the definition of defa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.