Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: López, Javier (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Okamoto, Eiji (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Έκδοση:1st ed. 2004.
Σειρά:Lecture Notes in Computer Science, 3269
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • On the Minimal Assumptions of Group Signature Schemes
  • Perfect Concurrent Signature Schemes
  • New Identity-Based Ring Signature Schemes
  • On the Security of a Multi-party Certified Email Protocol
  • Robust Metering Schemes for General Access Structures
  • PayFlux - Secure Electronic Payment in Mobile Ad Hoc Networks
  • Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN
  • Provably Secure Authenticated Tree Based Group Key Agreement
  • Taxonomic Consideration to OAEP Variants and Their Security
  • Factorization-Based Fail-Stop Signatures Revisited
  • A Qualitative Evaluation of Security Patterns
  • Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases
  • Volatile Memory Computer Forensics to Detect Kernel Level Compromise
  • A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet
  • Hydan: Hiding Information in Program Binaries
  • A Semi-fragile Steganographic Digital Signature for Images
  • Identification of Traitors Using a Trellis
  • Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation
  • Reflector Attack Traceback System with Pushback Based iTrace Mechanism
  • Automatic Covert Channel Analysis of a Multilevel Secure Component
  • Sound Approximations to Diffie-Hellman Using Rewrite Rules
  • On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks
  • New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm
  • Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure
  • Modelling Dependencies Between Classifiers in Mobile Masquerader Detection
  • Threat Analysis on NEtwork MObility (NEMO)
  • Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept
  • Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
  • Secret-Public Storage Trade-Off for Broadcast Encryption Key Management
  • Security Analysis of the Generalized Self-shrinking Generator
  • On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis
  • On Some Weak Extensions of AES and BES
  • Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario
  • Transient Fault Induction Attacks on XTR
  • Adaptive-CCA on OpenPGP Revisited
  • A New Key-Insulated Signature Scheme
  • Secure Hierarchical Identity Based Signature and Its Application
  • Multi-designated Verifiers Signatures
  • Dynamic Access Control for Multi-privileged Group Communications
  • An Efficient Authentication Scheme Using Recovery Information in Signature
  • Time-Scoped Searching of Encrypted Audit Logs
  • Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.