a front

Upload: rhemacs3

Post on 03-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 A Front

    1/40

    Encyclopedia of Cryptography and Security

  • 8/12/2019 A Front

    2/40

  • 8/12/2019 A Front

    3/40

    Henk C.A. van TilborgSushil Jajodia (Eds.)

    Encyclopedia of Cryptographyand Security

    With Figures and Tables

    With Cross-references

    1 3

  • 8/12/2019 A Front

    4/40

    EditorsHenk C.A. van ilborg

    Department o Mathematics and Computing Science

    Eindhoven University o echnology

    MB Eindhoven

    Te Netherlands

    Sushil Jajodia

    Center or Secure Inormation Systems

    George Mason University

    Fairax, VA -

    USA

    ISBN ---- e-ISBN ----DOI ./----ISBN Bundle: ----Springer New York Dordrecht Heidelberg London

    Library o Congress Control Number:

    Springer Science+Business Media, LLC ,

    All rights reserved. Tis work may not be translated or copied in whole or in part without the written permission o the publisher (SpringerScience+Business Media, LLC, Spring Street, New York, NY , USA), except or brie excerpts in connection with reviews or scholarlyanalysis. Use in connection with any orm o inormation storage and retrieval, electronic adaptation, computer sofware, or by similar ordissimilar methodology now known or hereafer developed is orbidden.Te use in this publication o trade names, trademarks, service marks, and similar terms, even i they are not identied as such, is not to betaken as an expression o opinion as to whether or not they are subject to proprietary rights.

    Printed on acid-ree paper

    Springer is part o Springer Science+Business Media(www.springer.com)

    http://www.springer.com/http://www.springer.com/http://www.springer.com/http://www.springer.com/
  • 8/12/2019 A Front

    5/40

  • 8/12/2019 A Front

    6/40

  • 8/12/2019 A Front

    7/40

    Preface to the First Edition

    Te need to protect valuable inormation is as old as history. As ar back as Roman times, Julius Caesar saw the need

    to encrypt messages by means o cryptographic tools. Even beore then, people tried to hide their messages by making

    them invisible. Tese hiding techniques, in an interesting twist o history, have resuraced quite recently in the context

    o digital rights management. o control access or usage o digital contents like audio, video, or sofware, inormation is

    secretly embedded in the data!

    Cryptology has developed over the centuries rom an art, in which only ew were skillul, into a science. Many people

    regardthe Communication Teory andSecrecy Systems paper, by Claude Shannon in , as the oundation o modern

    cryptology. However, at that time, cryptographic research was mostly restricted to government agencies and the military.

    Tat situation gradually changed with the expanding telecommunication industry. Communication systems that were

    completely controlled by computers demanded new techniques to protect the inormation owing through the network.

    In , the paper New Directions in Cryptography, by Whiteld Diffie and Martin Hellman, caused a shock in the

    academic community. Tis seminal paper showed that people who are communicating with each other over an insecureline can do so in a secure way with no need or a common secret key. In Shannons world o secret key cryptography

    this was impossible, but in act there was another cryptologic world o public-key cryptography, which turned out to

    have exciting applications in the real world. Te paper and the subsequent paper on the RSA cryptosystem in

    also showed something else: mathematicians and computer scientists had ound an extremely interesting new area o

    research, which was ueled by the ever-increasing social and scientic need or the tools that they were developing. From

    the notion o public-key cryptography, inormation security was born as a new discipline and it now affects almost every

    aspect o lie.

    As a consequence, inormation security, and even cryptology, is no longer the exclusive domain o research labo-

    ratories and the academic community. It rst moved to specialized consultancy rms, and rom there on to the many

    places in the world that deal with sensitive or valuable data; or example the nancial world, the health care sector, public

    institutions, nongovernmental agencies, human rights groups, and the entertainment industry.

    A rich stream o papers and many good books have been written on inormation security, but most o them assumea scholared reader who has the time to start at the beginning and work his way through the entire text. Te time has

    come to make important notions o cryptography accessible to readers who have an interest in a particular keyword

    related to computer security or cryptology, but who lack the time to study one o the many books on computer and

    inormation security or cryptology. At the end o , the idea to write an easily accessible encyclopedia on cryptography

    and inormation security was proposed. Te goal was to make it possible to become amiliar with a particular notion, but

    with minimal effort. Now, years later, the project is nished, thanks to the help o many contributors, people who are all

    very busy in their proessional lie. On behal o the Advisory Board, I would like to thank each o those contributors or

    their work. I would also like to acknowledge the eedback and help given by Mihir Bellare, Ran Canetti, Oded Goldreich,

    Bill Heelan, Carl Pomerance, and Samuel S. Wagstaff, Jr. A person who was truly instrumental or the success o this

    project is Jennier Evans at Springer Verlag. Her ideas and constant support are greatly appreciated. Great help has been

    given locally by Anita Klooster and Wil Kortsmit. Tank you very much, all o you.

    Henk C.A. van ilborg

  • 8/12/2019 A Front

    8/40

  • 8/12/2019 A Front

    9/40

  • 8/12/2019 A Front

    10/40

  • 8/12/2019 A Front

    11/40

    Editors

    Henk C.A. van Tilborg

    Department o Mathematics and Computing Science

    Eindhoven University o echnology

    Eindhoven

    Te Netherlands

    [email protected]

    Henk C.A. van ilborg is the Scientic Director o the research school EIDMA (Euler Institute or Discrete Mathematics

    and its Applications) and the Eindhoven Institute or the Protection o Systems and Inormation EIPSI. He is a board

    member o WIC (Werkgemeenschap voor Inormatie en Communicatietheorie).

    Dr. van ilborg received his M.Sc. () and Ph.D. degree () rom the Eindhoven University o echnology, the

    Netherlands. He was working as associate proessor at the university, beore he became a ull proessor in . During

    he also served a part-time proessorship at the Dutch Open University. He has also been a visiting proessor at

    Caliornia Institute o echnology, the University o Pretoria and Macquarie University and visiting scientist at the IBM

    Almaden Research Center and Bell Laboratories.

    He has been involved in the organization o many international conerences. He was the program committee co-chairo ISI- (IEEE International Symposium on Inormation Teory), Germany. He was Program Committee Member o

    WCC, WCC, WCC, WCC, and WCC (Workshop on Coding theory and Cryptography). He has

    been the advisor o about Ph.D. and M.Sc. students in the area o coding theory and cryptography.

    Dr. van ilborg has written three books, two on cryptology and one on coding theory. He is the (co-)author o more

    than articles in leading journals and also holds two patents. He is the Associate editor o Designs, Codes and Cryp-

    tography and Journal o Combinatorics, Inormation & System Sciences. From April December he was the

    Associate editor or the Journal o the Indonesian Mathematical Society. He is also the Advisory editor o Advances in

    Mathematics o Communications since January and editor o the Asian-European Journal o Mathematics.

    Webpage:http://www.win.tue.nl/~henkvt/

    http://www.win.tue.nl/~henkvt/http://www.win.tue.nl/~henkvt/
  • 8/12/2019 A Front

    12/40

    xii Editors

    Sushil Jajodia

    Center or Secure Inormation Systems

    George Mason University

    Fairax, VA

    USA

    [email protected]

    Sushil Jajodia is University Proessor, BDM International Proessor, and the director o Center or Secure Inormation

    Systems in the Volgenau School o Engineering at the George Mason University, Fairax, Virginia. He served as the chair

    o the Department o Inormation and Sofware Engineering during . He joined Mason afer serving as thedirector o the Database and Expert Systems Program within the Division o Inormation, Robotics, and Intelligent Sys-

    tems at the National Science Foundation. Beore that he was the head o the Database and Distributed Systems Section

    in the Computer Science and Systems Branch at the Naval Research Laboratory, Washington and Associate Proessor o

    Computer Science and Director o Graduate Studies at the University o Missouri, Columbia. He has also been a visiting

    proessor at the University o Milan, Italy; Sapienz University o Rome, Italy; Isaac Newton Institute or Mathematical

    Sciences, Cambridge University, England; and Kings College,London, England.

    Dr. Jajodia received hisPhD rom the Universityo Oregon, Eugene. Te scope o hiscurrent research interestsencom-

    passes inormation secrecy, privacy, integrity, and availability problems in military, civil, and commercial sectors. He has

    authored six books, edited thirty seven books and conerence proceedings, and published more than technical papers

    in the reereed journals and conerence proceedings. He is alsoa holdero eight patents and has several patent applications

    pending. He received the IFIP C Kristian Beckman award, Volgenau School o Engineering Outstanding

    Research Faculty Award and ACM SIGSAC Outstanding Contributions Award, and IFIP WG . Outstand-ing Research Contributions Award. He was recognized or the most accepted papers at the th anniversary o the IEEE

    Symposium on Security and Privacy. His h-index is and Erdos number is .

    Dr. Jajodia has served in different capacities or various journals and conerences. He serves on the editorial boards

    o IE Inormation Security, International Journal o Inormation and Computer Security, and International Journal

    o Inormation Security and Privacy. He was the ounding editor-in-chie o the Journal o Computer Security (

    ) and a past editor o ACM ransactions on Inormation and Systems Security () and IEEE ransactions

    on Knowledge and Data Engineering. He is the consulting editor o the Springer International Series on Advances in

    Inormation Security. He has been named a Golden Core member or his service to the IEEE Computer Society, and

    received International Federation or Inormation Processing (IFIP) Silver Core Award in recognition o outstanding

    services to IFIP in . He is a past chair o the ACM Special Interest Group on Security, Audit, and Control (SIGSAC),

    IEEE Computer Society echnical Committee on Data Engineering, and IFIP WG . on Systems Integrity and Control.

    He is a senior member o the IEEE and a member o IEEE Computer Society and Association or Computing Machinery.Webpage:http://csis.gmu.edu/aculty/jajodia.html

    http://csis.gmu.edu/faculty/jajodia.htmlhttp://csis.gmu.edu/faculty/jajodia.html
  • 8/12/2019 A Front

    13/40

    Editorial Board

    Carlisle Adams

    School of Information Technology and Engineering(SITE)University of [email protected]

    Friedrich L. Bauer

    [email protected]

    Gerrit Bleumer

    Research and DevelopmentFrancotyp GroupBirkenwerder bei [email protected]

    Dan Boneh

    Department of Computer ScienceStanford UniveristyStanford, [email protected]

    Pascale Charpin

    INRIARocquencourtLe Chesnay Cedex

    [email protected]

    Claude Crpeau

    School of Computer ScienceMcGill [email protected]

    Ernesto Damiani

    Dipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)[email protected]

    Sabrina De Capitani di Vimercati

    DTI-Dipartimento di Tecnologie dellInformazioneUniversit degli Studi di [email protected]

    Marijke De Soete

    [email protected]

    Yvo Desmedt

    Department of Computer ScienceUniversity College LondonLondonUnited [email protected]

    Somesh Jha

    Department of Computer ScienceUniversity of Wisconsin

    Madison, [email protected]

    Gregory Kabatiansky

    Dobrushin Mathematical LabInstitute for Information Transmission Problems [email protected]

  • 8/12/2019 A Front

    14/40

    xiv Editorial Board

    Angelos Keromytis

    Department of Computer ScienceColumbia UniversityNew York, NYUSA

    [email protected]

    Tanja Lange

    Coding Theory and Cryptology, Eindhoven Institute forthe Protection of Systems and Information, Departmentof Mathematics and Computer ScienceTechnische Universiteit EindhovenEindhovenThe [email protected]

    Catherine Meadows

    U.S. Naval Research LaboratoryWashington, [email protected],[email protected]

    Alfred Menezes

    Department of Combinatorics and OptimizationUniversity of WaterlooWaterlooOntarioCanada

    [email protected]

    David Naccache

    Dpartement dinformatique, Groupe de cryptographiecole normale [email protected]

    Sukumaran Nair

    Department of Computer Science and EngineeringBobby B. Lyle School of Engineering

    Southern Methodist [email protected]

    Peng Ning

    Department of Computer ScienceNorth Carolina State UniversityRaleigh, [email protected]@ncsu.edu

    Christof Paar

    Horst Gortz Institute for IT Security, Chair for EmbeddedSecurityRuhr-Universitatet BochumBochum

    [email protected]

    Stefano Paraboschi

    Dipartimento di Ingegneria dellInformazione e MetodiMatematiciUniversit degli Studi di BergamoDalmine, [email protected]

    Vincenzo PiuriDipartimento di Tecnologie dellInformazioneUniversita degli Studi di MilanoCrema (CR)Italy

    [email protected]

    Bart Preneel

    Department of Electrical Engineering-ESAT/COSICKatholieke Universiteit Leuven and IBBTLeuven-Heverlee

    [email protected]

    Jean-Jacques Quisquater

    Microelectronics LaboratoryUniversit catholique de LouvainLouvain-la-NeuveBelgiumJean-Jacques.Quisquater@uclouvain.be

    Kazue Sako

    [email protected]

    Pierangela Samarati

    Dipartimento di Tecnologie dellInformazioneUniversit degli Studi di [email protected]

  • 8/12/2019 A Front

    15/40

    Editorial Board xv

    Berry Schoenmakers

    Technische Universiteit EindhovenEindhovenThe [email protected]

    Sean W. Smith

    Department of Computer ScienceDartmouth CollegeHanover, [email protected]

    Angelos Stavrou

    Computer Science DepartmentSchool Information Technology and EngineeringGeorge Mason UniversityFairfax, VA

    [email protected]

    Patrick Traynor

    School of Computer ScienceGeorgia Institute of TechnologyAtlanta, GAUSA

    [email protected]

    Sencun Zhu

    Department of Computer Science and EngineeringPennsylvania State UniversityUniversity Park, [email protected]

  • 8/12/2019 A Front

    16/40

  • 8/12/2019 A Front

    17/40

    List of Contributors

    SAEED ABU-NIMEHDamballa Inc.Atlanta, GAUSA

    NABIL ADAMDepartment of Management Science and InformationSystems, CIMICRutgers, The State University of New JerseyNewark, NJ

    USA

    CARLISLE ADAMSSchool of Information Technology and Engineering(SITE)University of OttawaOttawa, OntarioCanada

    MALEK ADJOUADIDepartment of Electrical and Computer EngineeringFlorida International UniversityMiamiFlorida

    CHARU C. AGGARWALIBM T. J. Watson Research CenterHawthorne, NYUSA

    VIJAY ALTURIManagement Science and Information SystemsDepartmentCenter for Information Management, Integration andConnectivityRutgers UniversityNewark, NJUSA

    JIM ALVES-FOSSDepartment of Computer ScienceUniversity of IdahoMoscow, IDUSA

    CLAUDIO A. ARDAGNADipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)

    Italy

    ROBERTO AVANZIRuhr-Universitt BochumBochumGermany

    GILDAS AVOINEUniversit catholique de LouvainLouvain-la-Neuve

    Belgium

    ALI BAGHERZANDIDonald Bren School of Computer ScienceUniversity of CaliforniaIrvine, CAUSA

    SUMAN BANERJEEDepartment of Computer SciencesUniversity of Wisconsin at MadisonMadison, WIUSA

    ALEXANDER BARGDepartment of Electrical and Computer EngineeringUniversity of MarylandCollege Park, MDUSA

  • 8/12/2019 A Front

    18/40

    xviii List o f Contributors

    PAULO S.L.M.BARRETODepartment of Computer and Digital SystemsEngineering (PCS)Escola PolitcnicaUniversity of So Paulo (USP)

    So PauloBrazil

    FRIEDRICH L. BAUERKottgeiseringGermany

    HOMAYOONBEIGIResearchRecognition Technologies, Inc.

    Yorktown Heights, NYUSA

    DAVID ELLIOTT BELLRestonVAUSA

    STEVEN M. BELLOVINDepartment of Computer Science

    Columbia UniversityNew York, NYUSA

    OLIVIER BENOTIngenicoRgion de Saint-tienneFrance

    DANIEL J. BERNSTEIN

    Department of Computer ScienceUniversity of Illinois at ChicagoChicago, IllinoisUSA

    CLAUDIO BETTINIDipartimento di Informatica e Comunicazione (DICo)Universit degli Studi di MilanoMilanoItaly

    BIR BHANUCenter for Research in Intelligent SystemsUniversity of CaliforniaRiverside, CAUSA

    KAIGUI BIANDepartment of Electrical and Computer EngineeringVirginia TechBlacksburg, VAUSA

    FRDRIQUE BIENNIERLIESPINSA de LyonVilleurbanneFrance

    ELI BIHAMDepartment of Computer ScienceTechnion Israel Institute of TechnologyHaifaIsrael

    ALEX BIRYUKOVFDEF, Campus Limpertsberg

    University of LuxembourgLuxembourg

    JOACHIMBISKUPFakultt fr InformatikTechnische Universitt DortmundDortmundGermany

    SOMA BISWAS

    Department of Electrical and Computer EngineeringCenter for Automation ResearchUniversity of MarylandCollege Park, MDUSA

    J. BLACKDepartment of Computer ScienceBoulder, COUSA

  • 8/12/2019 A Front

    19/40

  • 8/12/2019 A Front

    20/40

    xx List of Contributors

    TOM CADDYInfoGard LaboratoriesSan Luis Obispo, CAUSA

    JON CALLASPGP CorporationMenlo park, CAUSA

    ALESSANDRO CAMPIDipartimento di Elettronica e InformazionePolitecnico di MilanoMilanoItaly

    PATRIZIO CAMPISIDepartment of Applied ElectronicsUniversit degli Studi Roma TRERomeItaly

    RAN CANETTIThe Blavatnik School of Computer SciencesTel Aviv University

    Ramat Aviv, Tel AvivIsrael

    HAKKI C. CANKAYADepartment of Computer EngineeringIzmir University of EconomicsIzmirTurkey

    EBRU CELIKEL CANKAYA

    Department of Computer Science and EngineeringUniversity of North TexasDenton, TXUSA

    CHRISTOPHE DE CANNIREDepartment of Electrical EngineeringKatholieke Universiteit LeuvenLeuven-HeverleeBelgium

    ANNE CANTEAUTProject-Team SECRETINRIA Paris-RocquencourtLe ChesnayFrance

    GUOHONG CAOMobile Computing and Networking (MCN) LabDepartment of Computer Science and EngineeringThe Pennsylvania State UniversityUniversity Park, PAUSA

    SRDJAN CAPKUNSystem Security Group

    Department of Computer ScienceETH ZurichZrichSwitzerland

    CLAUDE CARLETDpartement de mathmatiques and LAGAUniversit Paris Saint-Denis CedexFrance

    WILLIAM D. CASPERHigh Assurance Computing and Networking Labs(HACNet)Department of Computer Science and EngineeringBobby B. Lyle School of EngineeringSouthern Methodist UniversityHouston, TXUSA

    ANN CAVOUKIAN

    Information and Privacy Commissioners Office ofOntarioToronto, ONCanada

    DAVID CHALLENERApplied Physics LaboratoryJohns Hopkins UniversityLaurel, MDUSA

  • 8/12/2019 A Front

    21/40

    List of Contributors xxi

    PASCALECHARPININRIARocquencourtLe Chesnay CedexFrance

    RAMA CHELLAPPACenter for Automation ResearchDepartment of Electrical and Computer EngineeringUniversity of MarylandCollege Park, MDUSA

    BEE-CHUNG CHENYahoo! Research

    Mountain View, CAUSA

    YU CHENDepartment of Electrical and Computer EngineeringFlorida International UniversityMiamiFlorida

    CHEN-MOU CHENGDepartment of Electrical EngineeringNational Taiwan UniversityTaipeiTaiwan

    YOUNG B. CHOIDepartment of Natural Science, Mathematics andTechnologySchool of Undergraduate Studies Regent UniversityVirginia Beach, VAUSA

    HAMID CHOUKRIGemalto Compagny

    MIHAI CHRISTODORESCUIBM T.J. Watson Research CenterHawthorne, NYUSA

    STELVIO CIMATODepartment of Information TechnologiesUniversit degli Studi di MilanoCrema (CR)Italy

    ANDREW CLARKInformation Security InstituteQueensland University of TechnologyBrisbaneQueenslandAustralia

    DANNY DE COCKDepartment of Electrical Engineering-ESAT/COSICK.U. Leuven and IBBTLeuven-HeverleeBelgium

    SCOTT CONTINISilverbrook ResearchNew South WalesAustralia

    DEBBIE COOKTelcordia Applied Research

    PiscatawayNew JerseyUSA

    SCOTT E. COULLRedJack, LLC.Silver Spring, MDUSA

    CLAUDE CRPEAU

    School of Computer ScienceMcGill UniversityMontreal, QuebecCanada

    LORRIE FAITH CRANORSchool of Computer ScienceCarnegie Mellon UniversityPittsburg, PAUSA

  • 8/12/2019 A Front

    22/40

    xxii List of Contributors

    ERIC CRONINCIS DepartmentUniversity of PennsylvaniaPhiladelphia, PAUSA

    SCOTT CROSBYDepartment of Computer ScienceRice UniversityHouston, TXUSA

    MARY J. CULNANInformation and Process Management DepartmentBentley UniversityWaltham, MAUSA

    FRDRIC CUPPENSLUSSI DepartmentTELECOM BretagneCesson Svign CEDEXFrance

    NORA CUPPENS-BOULAHIALUSSI Department

    TELECOM BretagneCesson Svign CEDEXFrance

    REZA CURTMOLADepartment of Computer ScienceNew Jersey Institute of Technology (NJIT)Newark, NJUSA

    ITALO DACOSTADepartment of Computer SciencesGeorgia Institute of TechnologyParis, AtlantaUSA

    JOAN DAEMENSTMicroelectronicsZaventemBelgium

    ERNESTO DAMIANIDipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)Italia

    SABRINA DE CAPITANI DI VIMERCATIDipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)Italy

    MARIJKE DE SOETESecurityBizOostkampBelgium

    ALEXANDER W. DENTInformation Security GroupRoyal HollowayUniversity of LondonEgham, SurreyUK

    YVO DESMEDTDepartment of Computer ScienceUniversity College London

    LondonUK

    YEVGENIY DODISDepartment of Computer ScienceNew York UniversityNew YorkUSA

    JOSEP DOMINGO-FERRERDepartment of Computer Engineering and

    MathematicsUniversitat Rovira i VirgiliTarragonaCatalonia

    JING DONGDepartment of Computer SciencePurdue UniversityWest Lafayette, INUSA

  • 8/12/2019 A Front

    23/40

    List of Contributors xxiii

    GLENN DURFEESan Francisco, CAUSA

    CYNTHIA DWORKMicrosoft Research, Silicon ValleyMountain View, CAUSA

    WESLEY EDDYVerizon/NASA Glenn Research CenterCleveland,OhioUSA

    THOMAS EISENBARTHDepartment of Mathematical SciencesFlorida Atlantic University

    CARL M. ELLISONNew York, USA

    WILLIAM ENCKDepartment of Computer Science and EngineeringThe Pennsylvania State University

    University Park, PAUSA

    PAUL ENGLANDMicrosoft CorporationRedmond, WAUSA

    AARON ESTESDepartment of Computer Science and Engineering,

    Lyle School of EngineeringSouthern Methodist UniversityDallas, TXUSA

    MARTIN EVISONForensic Science ProgramUniversity of TorontoMississauga, ONCanada

    SERGE FENETLIRIS UMR Universit Claude Bernard Lyon Villeurbanne cedexFrance

    DAVID FERRAIOLONational Institute of Standards and TechnologyGaithersburg, MDUSA

    MATTHIEU FINIASZENSTAFrance

    CAROLINE FONTAINELab-STICC/CID and Telecom Bretagne/ITICNRS/Lab-STICC/CID and Telecom BretagneBrest Cedex France

    SARA FORESTIDipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)Italy

    DARIO V. FORTEFounder and CEODFLabsCrema/CRItalyand

    University of MilanoCremaItaly

    MATTHEW K. FRANKLINComputer Science DepartmentUniversity of CaliforniaDavis, CAUSA

  • 8/12/2019 A Front

    24/40

  • 8/12/2019 A Front

    25/40

    List of Contributors xxv

    QIJUN GUDepartment of Computer ScienceTexas State University-San MarcosSan Marcos, TexasUSA

    JORGE GUAJARDOBosch Research and Technology Center North AmericaPittsburghUSA

    YANLI GUOINRIA RocquencourtLe ChesnayFrance

    STUART HABERHP LabsPrincetonNew JerseyUSA

    HAKAN HACIGIMSNEC Research LabsCupertino, CAUSA

    HELENA HANDSCHUHComputer Security and Industrial CryptographyResearch GroupKatholieke Universiteit LeuvenLeuven - HeverleeBelgium

    DARREL HANKERSONDepartment of MathematicsAuburn UniversityAuburn, ALUSA

    CLEMENS HEINRICHFrancotyp-Postalia GmbHBirkenwerderGermany

    TOR HELLESETHThe Selmer CenterDepartment of InformaticsUniversity of BergenBergen

    Norway

    NADIA HENINGERDepartment of Computer SciencePrinceton UniversityUSA

    JEFF HOFFSTEINMathematics DepartmentBrown UniversityProvidence, RI

    USA

    BIJIT HOREDonald Bren School of Computer ScienceUniversity of CaliforniaIrvine, CAUSA

    DWIGHT HORNEDepartment of Computer Science and Engineering

    Southern Methodist UniversityDallas, TXUSA

    RUSS HOUSLEYVigil Security, LLCHerndon, VAUSA

    JEAN-PIERRE HUBAUXSchool of Computer and Communication Sciences

    cole PolytechniqueFdrale de LausanneLausanneSwitzerland

    MICHAEL T. HUNTERSchool of Computer ScienceGeorgia Institute of TechnologyAtlanta, GAUSA

  • 8/12/2019 A Front

    26/40

    xxvi List o f Contributors

    MICHAEL HUTHDepartment of ComputingImperial College LondonLondonUK

    SANGWON HYUNDepartment of Computer ScienceNorth Carolina State UniversityRaleigh, NCUSA

    HIDEKI IMAIChuo UniversityBunkyo-kuTokyo

    Japan

    SEBASTIAAN INDESTEEGEDepartment of Electrical Engineering-ESAT/COSICKatholieke Universiteit Leuven and IBBTLeuven-HeverleeBelgium

    JOHN IOANNIDISGoogle, Inc.

    New York, NYUSA

    ARUN IYENGARIBM Research DivisionThomas J. Watson Research CenterYorktown Heights, NYUSA

    COLLIN JACKSONCyLab, Department of Electrical and Computer

    EngineeringCarnegie Mellon UniversityMoffett Field, CAUSA

    TRENT JAEGERSystems and Internet Infrastructure Security LabPennsylvania State UniversityUniversity Park, PAUSA

    GOCE JAKIMOSKIElectrical and Computer EngineeringStevens Institute of TechnologyHoboken, NJUSA

    MARTIN JOHNSSAP Research CEC KarlsruheSAP AGD- KarlsruheGermany

    ANTOINE JOUXLaboratoire PrismUniversit de Versailles Saint-Quentin-en-YvelinesVersailles CedexFrance

    MARC JOYETechnicolor Security & Content Protection LabsCesson-Svign CedexFrance

    MIKE JUSTGlasgow Caledonian UniversityGlasgow, Scotland

    UK

    STEFAN KPSELLInstitute of Systems ArchitectureDepartment of Computer ScienceTechnische UniversitatDresdenGermany

    GREGORY KABATIANSKY

    Dobrushin Mathematical LabInstitute for Information Transmission Problems RASMoscowRussia

    BURT KALISKIOffice of the CTOEMC CorporationHopkinton, MAUSA

  • 8/12/2019 A Front

    27/40

    List of Contributors xxvii

    BRENT BYUNG HOON KANGDepartment of Applied Information Technology andCentre for Secure Information SystemsThe Volgenau School of EngineeringGeorge Mason University

    Fairfax, VAUSA

    VIVEK KANHANGADBiometrics Research CentreDepartment of ComputingThe Hong Kong Polytechnic UniversityHung HomKowloonHong Kong

    TIMO KASPERHorst Grst Institute for IT SecurityRuhr University Bochum

    STEFAN KATZENBEISSERSecurity Engineering GroupTechnische Universitt DarmstadtDarmstadtGermany

    ANGELOS D. KEROMYTISDepartment of Computer ScienceColumbia UniversityNew York, NYUSA

    GEORGE KESIDISComputer Science & Engineering and ElectricalEngineering DepartmentsPennsylvania State UniversityUniversity Park, PAUSA

    AGGELOS KIAYIASDepartment of Computer Science EngineeringUniversity of ConnecticutStorrs, CTUSA

    DANIEL KIFERDepartment of Computer Science and EngineeringPenn State UniversityUniversity Park, PAUSA

    JOHANNES KINDERFormal Methods in Systems EngineeringTechnische Universitt DarmstadtDarmstadtGermany

    ENGIN KIRDAInstitut EurecomSophia Antipolis

    France

    AMIT KLEINTrusteerTel AvivIsrael

    LARS R. KNUDSENDepartment of MathematicsTechnical University of Denmark

    LyngbyDenmark

    CETIN KAYAKOCollege of Engineering and Natural SciencesIstanbul Sehir UniversityUskudarIstanbulTurkey

    FRANOIS KOEUNEMicroelectronics LaboratoryUniversit catholique de LouvainLouvain-la-NeuveBelgium

    HUGO KRAWCZYKIBM T.J. Watson Research CenterNYUSA

  • 8/12/2019 A Front

    28/40

    xxvi ii List of Contributors

    ALEXANDER KRUPPAProjet CACAOLORIAVillers-ls-Nancy CedexFrance

    KRZYSZTOF KRYSZCZUKIBM Zurich Research Laboratory (DTI)LausanneSwitzerland

    MARKUS KUHNComputer LaboratoryUniversity of CambridgeCambridgeUK

    KAORU KUROSAWADepartment of Computer and Information SciencesIbaraki UniversityHitachi-shiJapan

    RUGGERO DONIDA LABATIDipartimento di Tecnologie dellInformazioneUniversit degli Studi di MilanoCrema (CR)

    Italy

    PETER LANDROCKCryptomathicUK

    JEAN-LOUIS LANETXLIM, Department of Mathematics and ComputerScienceUniversity of LimogesLimoges

    France

    TANJA LANGECoding Theory and CryptologyEindhoven Institute for the Protection of Systems andInformationDepartment of Mathematics and Computer ScienceTechnische Universiteit EindhovenEindhovenThe Netherlands

    GREGOR LEANDERDepartment of MathematicsTechnical University of DenmarkLyngbyDenmark

    ADAM J. LEEDepartment of Computer ScienceUniversity of PittsburghPittsburgh, PAUSA

    ELISABETH DE LEEUWSiemens IT Solutions and Services B.V.ZoetermeerThe Netherlands

    KRISTEN LEFEVREDepartment of Electrical Engineering and ComputerScienceUniversity of MichiganAnn Arbor, MIUSA

    ARJEN K. LENSTRALaboratory for cryptologic algorithms - LACALSchool of Computer and Communication Sciences

    cole Polytechnique Fdrale de LausanneSwitzerland

    REYNALD LERCIERInstitut de recherche mathmatique de RennesUniversit de Rennes Rennes CedexFrance

    PAUL LEYLANDBrnikat Limited

    Little ShelfordCambridgeUK

    STAN Z. LICenter for Biometrics and Security ResearchInstitute of AutomationChinese Academy of SciencesBeijingPublic Republic of China

  • 8/12/2019 A Front

    29/40

    List of Contributors xxix

    NINGHUI LIDepartment of Computer SciencePurdue UniversityWest Lafayette, IndianaUSA

    MING LIDepartment of Electrical and Computer EngineeringWorcester Polytechnic InstituteWorcester, MAUSA

    BENOT LIBERTMicroelectronics LaboratoryUniversit catholique de LouvainLouvain-la-Neuve

    Belgium

    MYEONG L. LIMDepartment of Applied Information Technology andCentre for Secure Information SystemsThe Volgenau School of EngineeringGeorge Mason UniversityFairfax, VAUSA

    SHINYOUNGLIM

    School of Health and Rehabilitation ServicesUniversity of PittsburghPittsburgh, PAUSA

    MOSES LISKOVDepartment of Computer ScienceThe College of William and MaryWilliamsburg, VAUSA

    DONGGANG LIUDepartment of Computer Science and EngineeringThe University of Texas at ArlingtonArlington, TexasUSA

    ZONGYI LIUAmazon.comSeattle, WAUSA

    GIOVANNI LIVRAGADipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)Italy

    STEVE LLOYDSphyrna Security IncorporatedSteve Lloyd Consulting Inc.Ottawa, ONCanada

    MICHAEL E. LOCASTODepartment of Computer ScienceGeorge Mason UniversityFairfax, VA

    USA

    WENJING LOUWireless Networking and SecurityDepartment of Electrical and Computer EngineeringWorcester Polytechnic InstituteWorcester, MAUSA

    HAIBING LUDepartment of Management Science and InformationSystems, CIMICRutgers, The State University of New JerseyNewark, NJUSA

    BODO MLLERGoogle Switzerland GmbHZurichSwitzerland

    ASHWIN MACHANAVAJJHALAYahoo! ResearchSanta Clara, CAUSA

    EMANUELE MAIORANADepartment of Applied ElectronicsUniversit degli Studi Roma TRERomeItaly

  • 8/12/2019 A Front

    30/40

    xxx List of Contributors

    HEIKO MANTELDepartment of Computer ScienceTU DarmstadtDarmstadtGermany

    DAVIDE MARTINENGHIDipartimento di Elettronica e InformazionePolitecnico di MilanoMilanoItaly

    HENRI MASSIASUniversity of LimogesFrance

    LEE D. MCFEARINDepartment of Computer Science and EngineeringSouthern Methodist UniversityDallas, TXUSA

    DAVID MCGREWPoolesville, MDUSA

    CATHERINE MEADOWSU.S. Naval Research LaboratoryWashington, DCUSA

    SHARAD MEHROTRADonald Bren School of Computer ScienceUniversity of CaliforniaIrvine, CAUSA

    ALFRED MENEZESDepartment of Combinatorics and OptimizationUniversity of WaterlooWaterloo, OntarioCanada

    DANIELE MICCIANCIODepartment of Computer Science & EngineeringUniversity of CaliforniaSan Diego, CAUSA

    EVANGELIA MICHELI-TZANAKOUDepartment of Biomedical EngineeringRutgers - The State University of New JerseyPiscataway, NJUSA

    JONATHAN K. MILLENThe MITRE CorporationBedford, MAUSA

    JELENA MIRKOVICInformation Sciences InstituteUniversity of Southern CaliforniaMarina del Rey, CAUSA

    FRANOIS MORAINLaboratoire dinformatique (LIX)cole polytechniquePalaiseau CedexFrance

    THOMAS MORRISDepartment of Electrical and Computer EngineeringMississippi State University

    Mississippi State, MSUSA

    HAROLD MOUCHREPolytech NantesUniversit de Nantes, IRCCyNNantesFrance

    NICKY MOUHA

    Department of Electrical EngineeringKatholieke Universiteit LeuvenLeuven-HeverleeBelgium

    DAVID NACCACHEDpartement dinformatique, Groupe de cryptographiecole normale suprieureParisFrance

  • 8/12/2019 A Front

    31/40

    List of Contributors xxxi

    DANIEL NAGYDepartment of Computer ScienceELTECRYPT Research Group Etvs Lrnd UniversityBudapestHungary

    PADMARAJ M. V. NAIRDepartment of Computer Science and EngineeringSchool of EngineeringSouthern Methodist UniversityDallas, TXUSA

    DALIT NAORDepartment of Computer Science and AppliedMathematics

    Weizmann Institute of ScienceRehovotIsrael

    GEORGE NECULAElectrical Engineering and Computer ScienceUniversity of CaliforniaBerkeley, CAUSA

    ALESSANDRO NERI

    Department of Applied ElectronicsUniversit degli Studi Roma TRERomeItaly

    KIM NGUYENBundesdruckerei GmbHBerlinGermany

    PHONG NGUYEN

    Dpartement dinformatiqueEcole normale suprieureParis, Cedex France

    PENG NINGDepartment of Computer ScienceNorth Carolina State UniversityRaleigh, NCUSA

    CRISTINA NITA-ROTARUDepartment of Computer SciencePurdue UniversityWest Lafayette, INUSA

    ANITA OCHIEANOVisa InternationalFoster City, CAUSA

    TAE OHSchool of InformaticsRochester Institute of TechnologyRochester, NY

    USA

    FRANCIS OLIVIERDepartment of Security TechnologyGemplus Card InternationalFrance

    ARKADIUSZ OROWSKIInstitute of PhysicsPolish Academy of SciencesWarsawPolandandDepartment of InformaticsWULS - SGGWWarsawPoland

    ALESSANDRO ORSOCollege of Computing - School of Computer Science

    Georgia Institute of TechnologyAtlanta, GAUSA

    AKIRA OTSUKAResearch Center for Information SecurityNational Institute of Advanced Industrial Science andTechnologyTokyoJapan

  • 8/12/2019 A Front

    32/40

    xxxii List of Contributors

    CHRISTOF PAARLehrstuhl Embedded Security, Gebaeude IC /Ruhr-Universitaet BochumBochumGermany

    PASCALPAILLIERCryptoExpertsParisFrance

    STEPHEN M. PAPAHigh Assurance Computing and Networking Labs(HACNet)Department of Computer Science and EngineeringBobby B. Lyle School of Engineering

    Southern Methodist UniversityHouston, TXUSA

    PANOS PAPADIMITRATOSSchool of Computer and Communication Sciencescole Polytechnique Fdrale de Lausanne, LausanneSwitzerland

    STEFANO PARABOSCHIDipartimento di Ingegneria dellInformazione e MetodiMatematiciUniversit degli Studi di BergamoDalmine, BGItaly

    JUNG-MIN JERRYPARKDepartment of Electrical and Computer EngineeringVirginia TechBlacksburg, VAUSA

    JACQUES PATARINVersailles St-Quentin-en-Yvelines UniversityFrance

    BRYAN D. PAYNEInformation Systems AnalysisSandia National LaboratoriesAlbuquerque, NMUSA

    CLAUDE CRPEAUSchool of Computer ScienceMcGill UniversityMontreal, QuebecCanada

    TORBEN PEDERSENCryptomathicrhusDenmark

    GERARDO PELOSIDipartimento di Elettronica e Informazione (DEI)Politecnico di MilanoMilanoItalyandDipartimento di Ingegneria dellInformazione e MetodiMatematici (DIIMM)University of BergamoDalmine (BG)Italy

    GNTHER PERNULLS fr Wirtschaftsinformatik I -Informationssysteme

    Universitt RegensburgRegensburgGermany

    CHRISTIANE PETERSDepartment of Mathematics and Computer ScienceTechnische Universiteit EindhovenThe Netherlands

    CHRISTOPHE

    PETIT

    Microelectronics LaboratoryUniversit catholique de LouvainLouvain-la-NeuveBelgium

    FABIEN A. P. PETITCOLASMicrosoft ResearchCambridgeUK

  • 8/12/2019 A Front

    33/40

    List of Contributors xxxiii

    BENNY PINKASDepartment of Computer ScienceUniversity of HaifaHaifaIsrael

    KONSTANTINOSN. PLATANIOTISThe Edward S Rogers Sr. Department of Electrical &Computer Engineeringand Knowledge Media DesignInstituteUniversity of TorontoToronto, ONCanada

    ANGELIKA PLATEDirector, AEXIS Security ConsultantsBonnGermany

    FERNANDO L. PODIOITL Computer Security Division/Systems and EmergingTechnologies Security Research GroupNational Institute of Standards and Technology (NIST)Gaithersburg, MDUSA

    DAVID POINTCHEVALComputer Science DepartmentEcole normale suprieureParisFrance

    MICHALIS POLYCHRONAKISDepartment of Computer Science

    Network Security LabColumbia UniversityNew York, NYUSA

    DENIS V. POPELAlgorithms Research CorporationCharlottesville, VAUSA

    BART PRENEELDepartment of Electrical Engineering-ESAT/COSICKatholieke Universiteit Leuven and IBBTLeuven-HeverleeBelgium

    NIELS PROVOSGoogle INCMountain View, CAUSA

    JEAN-JACQUES QUISQUATERMicroelectronics LaboratoryUniversit catholique de Louvain

    Louvain-la-NeuveBelgium

    RADMILO RACICDepartment of Computer ScienceUniversity of CaliforniaDavis, CAUSA

    MOHAMED OMAR RAYESDepartment of Computer Science and EngineeringBobby B. Lyle School of Engineering SouthernMethodist UniversityDallas, TXUSA

    KUI RENUbiquitous Security & PrivaCy Research Laboratory(UbiSeC Lab)Department of Electrical and Computer Engineering

    Illinois Institute of TechnologyChicago, ILUSA

    JONAS RICHIARDIEcole PolytechniqueFdrale de Lausanne EPFL - STI IBILausanneSwitzerland

  • 8/12/2019 A Front

    34/40

    xxxiv List of Contributors

    MORITZ RIESNERDepartment of Information SystemsUniversity of RegensburgRegensburgGermany

    VINCENT RIJMENDepartment of Electrical Engineering/ESATKatholieke Universiteit LeuvenHeverleeBelgium

    RONALD L. RIVESTDepartment of Electrical Engineering and ComputerScienceMassachusetts Institute of TechnologyCambridge, MAUSA

    MATTHEW J. B. ROBSHAWOrange LabsIssy Moulineaux, Cedex France

    ARNON ROSENTHALThe MITRE Corporation

    Bedford, MAUSA

    ARUN ROSSDepartment of Computer Science and ElectricalEngineeringWest Virginia UniversityMorgantown, WVUSA

    SCOTT A. ROTONDOOracle CorporationRedwood Shores, CAUSA

    JUNGWOO RYOODivision of Business and EngineeringPenn State AltoonaAltoona, PAUSA

    KAZUE SAKONECKawasakiJapan

    MALEK BEN SALEMDepartment of Computer ScienceColumbia UniversityNew York, NYUSA

    GUIDO SALVANESCHIDepartment of Electronic and InformationPolytechnic of MilanMilanoItaly

    PAOLO SALVANESCHIDepartment of Information Technology andMathematical MethodsUniversity of BergamoDalmine, BGItaly

    PIERANGELA SAMARATIDipartimento di Tecnologie dellInformazione (DTI)

    Universit degli Studi di MilanoCrema (CR)Italy

    DAVID SAMYDEIntel CorporationSanta Clara, CAUSA

    SUDEEP SARKAR

    Computer Science and EngineeringUniversity of South FloridaTampa, FLUSA

    ROBERTO SASSIDepartment of Information TechnologiesUniversit degli Studi di MilanoCrema (CR)Italy

  • 8/12/2019 A Front

    35/40

    List of Contributors xxxv

    BRUCE SCHNEIERBTLondonUK

    BERRY SCHOENMAKERSDepartment of Mathematics and Computer ScienceTechnische Universiteit EindhovenEindhovenThe Netherlands

    MATTHIAS SCHUNTERIBM Research-ZurichRschlikonSwitzerland

    JRG SCHWENKHorst Grtz Institute for IT SecurityRuhr University BochumBochumGermany

    EDWARD SCIOREComputer Science DepartmentBoston CollegeChestnut Hill, MAUSA

    FABIO SCOTTIDipartimento di Tecnologie dellInformazioneUniversit degli Studi di MilanoCrema (CR)Italy

    NICOLAS SENDRIERProject-Team SECRETINRIA Paris-RocquencourtLe Chesnay

    France

    EHAB AL- SHAERCyber Defense and Network Assurability (CyberDNA)CenterDepartment of Software and Information SystemsCollege of Computing and InformaticsUniversity of North Carolina CharlotteCharlotte, NCUSA

    BASIT SHAFIQCIMICRutgers, The State University of New JerseyNewark, NJUSA

    ADI SHAMIRThe Paul and Marlene Borman Professor of AppliedMathematicsWeizmann Institute of ScienceRehovotIsrael

    MICAH SHERRDepartment of Computer Science

    Georgetown UniversityWashington, DCUSA

    IGOR SHPARLINSKIDepartment of Computing Faculty of ScienceMacquarie UniversityAustralia

    ROBERT SILVERMANChelmsford, MAUSA

    RICHARD T. SIMONHarvard Medical SchoolCenter for Biomedical InformaticsCambridge, MAUSA

    GREG SINCLAIRThe Volgenau School of Engineeringand ITCentre for Secure Information SystemsGeorge Mason UniversityFairfax, VAUSA

    GAUTAM SINGARAJUThe Volgenau School of Engineeringand ITGeorge Mason University Ask.com

  • 8/12/2019 A Front

    36/40

    xxxvi List of Contributors

    RADU SIONNetwork Security and Applied Cryptography LabDepartment of Computer ScienceStony Brook UniversityStony Brook, NY

    USA

    BEN SMEETSDepartment of Information TechnologyLund UniversityLundSweden

    SEAN W. SMITHDepartment of Computer ScienceDartmouth College

    Hanover, NHUSA

    ALAN D. SMITHDepartment of Management and MarketingRobert Morris UniversityPittsburgh, PAUSA

    JEROME A. SOLINASNational Security Agency

    Ft Meade, MDUSA

    ANURAG SRIVASTAVADepartment of Applied Information Technology andCentre for Secure Information SystemsThe Volgenau School of EngineeringGeorge Mason UniversityFairfax, VAUSA

    MUDHAKAR SRIVATSAIBM Research DivisionThomas J. Watson Research CenterYorktown Heights, NYUSA

    WILLIAM STALLINGSWilliamStallings.comBrewster, MAUSA

    FRANOIS-XAVIER STANDAERTMicroelectronics LaboratoryUniversit Catholique de LouvainLouvain-la-NeuveBelgium

    ANGELOS STAVROUComputer Science DepartmentSchool Information Technology and EngineeringGeorge Mason UniversityFairfax, VAUSA

    GRAHAM STEELLaboratoire Specification et VerificationINRIA, CNRS & ENS

    CachanFrance

    MARK STEPHENSSMU HACNet LabsSchool of EngineeringSouthern Methodist UniversityNacogdoches, TXUSA

    ANTON STIGLICInstant LogicCanada

    ALEX STOIANOVInformation and Privacy Commissioners Office ofOntarioToronto, ONCanada

    SALVATORE J. STOLFO

    Department of Computer ScienceColumbia UniversityNew York, NYUSA

    SCOTT D. STOLLERDepartment of Computer ScienceStony Brook UniversityStony Brook, NYUSA

  • 8/12/2019 A Front

    37/40

    List of Contributors xxxvii

    NARY SUBRAMANIANDepartment of Computer ScienceThe University of Texas at TylerTyler, TXUSA

    KUN SUNIntelligent Automation, Inc.Rockville, MDUSA

    BERK SUNARDepartment of Electrical and Computer EngineeringWorcester Polytechnic InstituteWorcester, MAUSA

    LAURENT SUSTEKInside Secure FranceAtmelFrance

    ANDREW BENG JIN TEOHSchool of Electrical and Electronic EngineeringYonsei UniversitySeodaemun-gu, Seoul

    Korea

    EDLYN TESKEDepartment of Combinatorics and OptimizationUniversity of WaterlooWaterloo, OntarioCanada

    NICOLAS THRIAULTDepartamento de MatemticaUniversidad del Bo-Bo

    TalcaChile

    ACHINT THOMASCenter for Unified Biometrics and Sensors (CUBS)Department of Computer Science and EngineeringUniversity at Buffalo (SUNY Buffalo), The StateUniversity of New YorkAmherst, NYUSA

    EMMANUEL THOMEINRIA Lorraine Campus ScientifiqueVILLERS-LS-NANCY CEDEXFrance

    MITCHELL A. THORNTONDepartment of Computer Science and EngineeringDepartment of Electrical EngineeringLyle School of EngineeringSouthern Methodist UniversityDallas, TXUSA

    MEHDI TIBOUCHILaboratoire dinformatique de lENS

    cole normale suprieureParisFrance

    KAR-ANN TOHSchool of Electrical and Electronic EngineeringYonsei UniversitySeodaemun-gu, SeoulKorea

    ASSIA TRIACEA-LETIFrance

    ERAN TROMERComputer Science and Artificial Intelligence LaboratoryMassachusetts Institute of TechnologyCambridge, MAUSA

    SEAN TURNERIECA, Inc.Fairfax, VAUSA

    SHAMBHU UPADHYAYADepartment of Computer Science and EngineeringUniversity at Buffalo The State University of New YorkBuffalo, NYUSA

  • 8/12/2019 A Front

    38/40

    xxxvii i Listof Contributors

    SALIL VADHANSchool of Engineering & Applied SciencesHarvard UniversityCambridge, MAUSA

    JAIDEEP VAIDYADepartment of Management Science and InformationSystems, CIMICRutgers, The State University of New JerseyNewark, NJUSA

    HENK C. A. VANTILBORGDepartment of Mathematics and Computing ScienceEindhoven University of TechnologyEindhovenThe Netherlands

    MAYANKVARIAComputer Science and Artificial Intelligence Laboratory(CSAIL)Massachusetts Institute of TechnologyCambridge, MAUSA

    MARC VAUCLAIRBU Identification, Center of Competence SystemsSecurityNXP SemiconductorsLeuvenBelgium

    HELMUT VEITHInstitute of Information SystemsTechnische Universitt WienWienAustria

    V. N. VENKATAKRISHNANDepartment of Computer ScienceUniversity of Illinois at ChicagoChicago, ILUSA

    CHRISTIAN VIARD-GAUDINPolytech NantesUniversit de Nantes, IRCCyNNantesFrance

    MARION VIDEAUUniversit Henri Poincar, Nancy /LORIA and ANSSIParisFrance

    B. V. K. VIJAYA KUMARDepartment of Electrical and Computer EngineeringCarnegie Mellon UniversityPittsburgh, PA

    USA

    DAN WALLACHDepartment of Computer ScienceRice UniversityHouston, TXUSA

    COLIN D. WALTERInformation Security Group

    Royal Holloway University of LondonSurreyUK

    XIAOFENG WANGSchool of Informatics and ComputingIndiana University at BloomingtonBloomington, INUSA

    MICHAEL WARDProduct Security Chip Centre of ExcellenceMasterCard WorldwideWaterlooBelgium

    NICHOLAS C. WEAVERInternational Computer Science InstituteBerkeley, CAUSA

  • 8/12/2019 A Front

    39/40

  • 8/12/2019 A Front

    40/40

    xl List of Contributors

    BULENT YENERDepartment of Computer ScienceRensselaer Polytechnic InstituteTroy, NYUSA

    SACHIKOYOSHIHAMAIBM Research-TokyoYamato, KanagawaJapan

    SHUCHENG YUDepartment of Electrical and Computer EngineeringWorcester Polytechnic InstituteWorcester, MAUSA

    FENG YUESchool of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina

    WENSHENG ZHANGDepartment of Computer ScienceCollege of Liberal Arts and SciencesIowa State UniversityAmes, IAUSA

    DAVID ZHANGBiometrics Research Centre, Department of ComputingThe Hong Kong Polytechnic UniversityHung Hom, KowloonHong Kong

    SENCUN ZHUDepartment of Computer Science and EngineeringPennsylvania State UniversityUniversity Park, PAUSA

    ZHICHAO ZHUDepartment of Computer Science and EngineeringThe Pennsylvania State UniversityUniversity Park, PAUSA

    PAUL ZIMMERMANNTeam Caramel, Btiment ALORIA/INRIA

    Villers-ls-Nancy CedexFrance

    ROBERT ZUCCHERATO Carle CrescentOntarioCanada

    WANGMENG ZUOSchool of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina

    MARY ELLEN ZURKOIBM Software Group Lotus Live Security Architectureand StrategyWestford, MAUSA