Information and Communications Security 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings /
ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10-13 October 2003. Among the preceding conferences, ICICS'97 was held in B- jing, China, ICICS'99 in Sydney, Australia, ICICS 2001 in Xi'an, Ch...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2003.
|
Έκδοση: | 1st ed. 2003. |
Σειρά: | Lecture Notes in Computer Science,
2836 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- A Fast Square Root Computation Using the Frobenius Mapping
- A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption
- Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
- On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST
- A Policy Based Framework for Access Control
- Trading-Off Type-Inference Memory Complexity against Communication
- Security Remarks on a Group Signature Scheme with Member Deletion
- An Efficient Known Plaintext Attack on FEA-M
- An Efficient Public-Key Framework
- ROCEM: Robust Certified E-mail System Based on Server-Supported Signature
- Practical Service Charge for P2P Content Distribution
- ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback
- A Lattice Based General Blind Watermark Scheme
- Role-Based Access Control and the Access Control Matrix
- Broadcast Encryption Schemes Based on the Sectioned Key Tree
- Research on the Collusion Estimation
- Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains
- Protocols for Malicious Host Revocation
- A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code
- A Novel Two-Level Trust Model for Grid
- Practical t-out-n Oblivious Transfer and Its Applications
- Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
- ID-Based Distributed "Magic Ink" Signature from Pairings
- A Simple Anonymous Fingerprinting Scheme Based on Blind Signature
- Compact Conversion Schemes for the Probabilistic OW-PCA Primitives
- A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems
- A Novel Efficient Group Signature Scheme with Forward Security
- Variations of Diffie-Hellman Problem
- A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine
- A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine
- UC-RBAC: A Usage Constrained Role-Based Access Control Model
- (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography
- An Optimized Multi-bits Blind Watermarking Scheme
- A Compound Intrusion Detection Model
- An Efficient Convertible Authenticated Encryption Scheme and Its Variant
- Space-Economical Reassembly for Intrusion Detection System
- A Functional Decomposition of Virus and Worm Programs.