Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings /

The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- rap...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Qing, Sihan (Επιμελητής έκδοσης), Mao, Wenbo (Επιμελητής έκδοσης), López, Javier (Επιμελητής έκδοσης), Wang, Guilin (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3783
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Fair Exchange
  • An Evenhanded Certified Email System for Contract Signing
  • Efficient ID-Based Optimistic Fair Exchange with Provable Security
  • On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol
  • Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery
  • Digital Signatures I
  • Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security
  • On Delegatability of Four Designated Verifier Signatures
  • PIATS: A Partially Sanitizable Signature Scheme
  • Cryptographic Protocols
  • Ciphertext Comparison, a New Solution to the Millionaire Problem
  • Private Itemset Support Counting
  • Visual Cryptographic Protocols Using the Trusted Initializer
  • Admissible Interference by Typing for Cryptographic Protocols
  • Cryptanalysis
  • On the Security Bounds of CMC, EME, EME?+? and EME* Modes of Operation
  • On the Security of Encryption Modes of MD4, MD5 and HAVAL
  • Cryptanalysis of PASS II and MiniPass
  • Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves
  • Digital Signatures II
  • Asymmetric Concurrent Signatures
  • Generic Construction of (Identity-Based) Perfect Concurrent Signatures
  • Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains
  • Network Security
  • Session Table Architecture for Defending SYN Flood Attack
  • A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks
  • Port Scan Behavior Diagnosis by Clustering
  • Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
  • Applied Cryptography
  • Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails
  • Secure Multicast Using Proxy Encryption
  • Efficient and Non-interactive Timed-Release Encryption
  • Key Management
  • Security Properties of Two Authenticated Conference Key Agreement Protocols
  • Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity
  • Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment
  • Access Control
  • Enforce Mandatory Access Control Policy on XML Documents
  • Network Access Control for Mobile Ad-Hoc Networks
  • Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
  • Applications
  • Authenticating Query Results in Data Publishing
  • Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
  • Batching SSL/TLS Handshake Improved
  • Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
  • Watermarking
  • Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio
  • Reversible Watermark with Large Capacity Using the Predictive Coding
  • System Security
  • PCAV: Internet Attack Visualization on Parallel Coordinates
  • Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA
  • D_DIPS: An Intrusion Prevention System for Database Security.