Abstract :
The following topics are dealt with: Sboxes statistical criteria generalization; modular multiplication modulo; zero-message broadcast encryption scheme; secure multiparty computation; dynamic broadcast encryption scheme; image denoising methods; image Steganography methods; wavelet domain; signature verification based authentication; ID-based key agreement protocol; separate network users; image secret sharing; image secret hiding; RFID distance bounding protocol; policy specification; policy enforcement; online social networks; MKNF+; dynamic malware detection; register value set analysis; modified dual watermarking scheme; digital images; tamper localization; recovery capabilities; social networks; end key establishment protocol; wireless sensor networks; software security; SAN models; OrBAC nonmonotonocity; exception policy rules; real-time attack scenario detection; intrusion detection; alert correlation; efficient generic patterns; convertible limited multiverifier signature; ECC security; RFID authentication protocol; mutual authentication protocol; NFC phones; POS terminals; secure payment transactions; reputation-based access control model; trust reputation-based access control model; virtual organizations; FOO e-voting protocol; inductive analysis; image watermarking algorithm; chaotic maps; wavelet nonmonotonocity transform; PCPD; security system attack; searchable encryption schemes; forensic detection; 2D-histogram; Zernike moments; structural TLR algorithm; anomaly detection; danger theory; Sybil attacker behavior modeling; and VANETs.
Keywords :
cryptographic protocols; digital signatures; image coding; image denoising; image forensics; image watermarking; invasive software; radiofrequency identification; social networking (online); statistical analysis; steganography; vehicular ad hoc networks; wavelet transforms; wireless sensor networks; 2D-histogram; ECC security; FOO e-voting protocol; ID-based key agreement protocol; MKNF+; NFC phones; OrBAC nonmonotonocity; PCPD; POS terminals; RFID authentication protocol; RFID distance bounding protocol; SAN models; Sboxes statistical criteria generalization; Sybil attacker behavior modeling; VANETs; Zernike moments; anomaly detection; chaotic maps; convertible limited multiverifier signature; danger theory; digital images; dynamic broadcast encryption scheme; dynamic malware detection; efficient generic patterns; eligibility property; end key establishment protocol; exception policy rules; forensic detection; image Steganography methods; image denoising methods; image secret hiding; image secret sharing; image watermarking algorithm; inductive analysis; intrusion detection alert correlation; modified dual watermarking scheme; modular multiplication modulo; mutual authentication protocol; online social networks; policy enforcement; policy specification; real-time attack scenario detection; recovery capabilities; register value set analysis; reputation-based access control model; searchable encryption schemes; secure multiparty computation; secure payment transactions; security system attack; separate network users; signature verification based authentication; software security; structural TLR algorithm; tamper localization; trust reputation-based access control model; virtual organizations; wavelet domain; wavelet nonmonotonocity transform; wireless sensor networks; zero-message broadcast encryption scheme;
Conference_Titel :
Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
Conference_Location :
Tabriz
Print_ISBN :
978-1-4673-2387-1
DOI :
10.1109/ISCISC.2012.6408220