Information and Communications Security 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings /

This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Deng, Robert H. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Bao, Feng (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Zhou, Jianying (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2513
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • System Security I
  • Defenses against the Truncation of Computation Results of Free-Roaming Agents
  • A Distributed Dynamic ?Firewall Architecture with Mobile Agents and KeyNote Trust Management System
  • Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack
  • An Evaluation of Different IP Traceback Approaches
  • Security against Inference Attacks on Negative Information in Object-Oriented Databases
  • Cryptosystem I
  • Robust Key-Evolving Public Key Encryption Schemes
  • A Group Signature Scheme Committing the Group
  • Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions
  • Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
  • Reducing the Memory Complexity of Type-Inference Algorithms
  • Security Protocol I
  • The Risks of Compromising Secret Information
  • Password-Authenticated Key Exchange between Clients with Different Passwords
  • Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction
  • Attacking Predictable IPsec ESP Initialization Vectors
  • Fingerprinting & Watermarking
  • An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code
  • A Robust Block Oriented Watermarking Scheme in Spatial Domain
  • A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing
  • Efficient Implementation of Algorithms
  • Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fields
  • Fast Elliptic Curve Multiplications with SIMD Operations
  • Further Results on Multiples of Primitive Polynomials and Their Products over GF(2)
  • System Security II
  • A Secure Object Sharing Scheme for Java Card
  • IDS Interoperability and Correlation Using IDMEF and Commodity Systems
  • A Synthetic Fraud Data Generation Methodology
  • User Interaction Design for Secure Systems
  • Using Independent Auditors as Intrusion Detection Systems
  • Cryptosystem II
  • Cellular Automata Based Cryptosystem (CAC)
  • New Weak-Key Classes of IDEA
  • Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC
  • A New Statistical Testing for Symmetric Ciphers and Hash Functions
  • Message Authentication Codes with Error Correcting Capabilities
  • Access Control
  • The Consistency of an Access Control List
  • Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies
  • A Specification Language for Distributed Policy Control
  • Access Control Infrastructure for Digital Objects
  • Security Protocol II
  • Distributed Key Generation as a Component of an Integrated Protocol
  • A Secure Agent-Mediated Payment Protocol
  • Cryptanalysis & Cryptographic Techniques
  • Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
  • Related-Cipher Attacks
  • A Chosen Plaintext Linear Attack on Block Cipher CIKS-1
  • Ideal Threshold Schemes from Orthogonal Arrays
  • Cryptanalysis of the Reduced-Round RC6.