This book constitutes the refereed proceedings of the 8th International Information Security Conference, ISC 2005, held in Singapore in September 2005.
The 33 revised full papers presented together with 5 student papers were carefully reviewed and selected from 271 submissions. The papers are organized in topical sections on network security, trust and privacy, key management and protocols, public key encryption and signature, signcryption, crypto algorithm and analysis, cryptography, applications, software security, authorization, and access control.
This book constitutes the refereed proceedings of the 8th International Information Security Conference, ISC 2005, held in Singapore in September 2...
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a...
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP ...