Information and Communications Security 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings /
This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2002.
|
Έκδοση: | 1st ed. 2002. |
Σειρά: | Lecture Notes in Computer Science,
2513 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- System Security I
- Defenses against the Truncation of Computation Results of Free-Roaming Agents
- A Distributed Dynamic ?Firewall Architecture with Mobile Agents and KeyNote Trust Management System
- Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack
- An Evaluation of Different IP Traceback Approaches
- Security against Inference Attacks on Negative Information in Object-Oriented Databases
- Cryptosystem I
- Robust Key-Evolving Public Key Encryption Schemes
- A Group Signature Scheme Committing the Group
- Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions
- Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
- Reducing the Memory Complexity of Type-Inference Algorithms
- Security Protocol I
- The Risks of Compromising Secret Information
- Password-Authenticated Key Exchange between Clients with Different Passwords
- Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction
- Attacking Predictable IPsec ESP Initialization Vectors
- Fingerprinting & Watermarking
- An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code
- A Robust Block Oriented Watermarking Scheme in Spatial Domain
- A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing
- Efficient Implementation of Algorithms
- Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fields
- Fast Elliptic Curve Multiplications with SIMD Operations
- Further Results on Multiples of Primitive Polynomials and Their Products over GF(2)
- System Security II
- A Secure Object Sharing Scheme for Java Card
- IDS Interoperability and Correlation Using IDMEF and Commodity Systems
- A Synthetic Fraud Data Generation Methodology
- User Interaction Design for Secure Systems
- Using Independent Auditors as Intrusion Detection Systems
- Cryptosystem II
- Cellular Automata Based Cryptosystem (CAC)
- New Weak-Key Classes of IDEA
- Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC
- A New Statistical Testing for Symmetric Ciphers and Hash Functions
- Message Authentication Codes with Error Correcting Capabilities
- Access Control
- The Consistency of an Access Control List
- Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies
- A Specification Language for Distributed Policy Control
- Access Control Infrastructure for Digital Objects
- Security Protocol II
- Distributed Key Generation as a Component of an Integrated Protocol
- A Secure Agent-Mediated Payment Protocol
- Cryptanalysis & Cryptographic Techniques
- Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
- Related-Cipher Attacks
- A Chosen Plaintext Linear Attack on Block Cipher CIKS-1
- Ideal Threshold Schemes from Orthogonal Arrays
- Cryptanalysis of the Reduced-Round RC6.