IWSEC 2011 Accepted Papers (in order of submission)

  1. Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique
    Atsushi Fujioka
  2. Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
    Ryotaro Hayashi, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii and Koji Okada
  3. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points
    Georgios Portokalidis and Angelos D. Keromytis
  4. Cryptographic Pairings Based on Elliptic Nets
    Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama and Eiji Okamoto
  5. A Theoretical Analysis of the Structure of HC-128
    Goutam Paul, Subhamoy Maitra and Shashwat Raizada
  6. A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators
    Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno and Yasuhide Numata
  7. A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes
    Minoru Kuribayashi
  8. Identity Based Deterministic Signature Scheme Without Forking-Lemma
    S. Sharmila Deva Selvi, S. Sree Vivek and C. Pandu Rangan
  9. Towards Restricting Plaintext Space in Public Key Encryption
    Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai and Kazumasa Omote
  10. An Entropy based approach for DDoS attack detection in IEEE 802.16 based networks
    Maryam Shojaei, Naser Movahedinia and Behrouz Tork Ladani
  11. Nitro: Hardware-based System Call Tracing for Virtual Machines
    Jonas Pfoh, Christian Schneider and Claudia Eckert
  12. Experimental Verification of Super-Sbox Analysis --- Confirmation of Detailed Attack Complexity
    Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama and Kazuo Ohta
  13. A Secure M + 1st Price Auction Protocol based on Bit Slice Circuits
    Takuho Mitsunaga, Yoshifumi Manabe and Tatsuaki Okamoto
  14. Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking
    Angeliki Zavou, Georgios Portokalidis and Angelos D. Keromytis