Information and Communications Security 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings /

ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10-13 October 2003. Among the preceding conferences, ICICS'97 was held in B- jing, China, ICICS'99 in Sydney, Australia, ICICS 2001 in Xi'an, Ch...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Perner, Petra (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Gollmann, Dieter (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Zhou, Jianying (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2836
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • A Fast Square Root Computation Using the Frobenius Mapping
  • A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption
  • Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
  • On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST
  • A Policy Based Framework for Access Control
  • Trading-Off Type-Inference Memory Complexity against Communication
  • Security Remarks on a Group Signature Scheme with Member Deletion
  • An Efficient Known Plaintext Attack on FEA-M
  • An Efficient Public-Key Framework
  • ROCEM: Robust Certified E-mail System Based on Server-Supported Signature
  • Practical Service Charge for P2P Content Distribution
  • ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback
  • A Lattice Based General Blind Watermark Scheme
  • Role-Based Access Control and the Access Control Matrix
  • Broadcast Encryption Schemes Based on the Sectioned Key Tree
  • Research on the Collusion Estimation
  • Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains
  • Protocols for Malicious Host Revocation
  • A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code
  • A Novel Two-Level Trust Model for Grid
  • Practical t-out-n Oblivious Transfer and Its Applications
  • Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
  • ID-Based Distributed "Magic Ink" Signature from Pairings
  • A Simple Anonymous Fingerprinting Scheme Based on Blind Signature
  • Compact Conversion Schemes for the Probabilistic OW-PCA Primitives
  • A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems
  • A Novel Efficient Group Signature Scheme with Forward Security
  • Variations of Diffie-Hellman Problem
  • A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine
  • A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine
  • UC-RBAC: A Usage Constrained Role-Based Access Control Model
  • (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography
  • An Optimized Multi-bits Blind Watermarking Scheme
  • A Compound Intrusion Detection Model
  • An Efficient Convertible Authenticated Encryption Scheme and Its Variant
  • Space-Economical Reassembly for Intrusion Detection System
  • A Functional Decomposition of Virus and Worm Programs.