Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Qing, Sihan (Επιμελητής έκδοσης), Imai, Hideki (Επιμελητής έκδοσης), Wang, Guilin (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4861
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Authentication and Key Exchange
  • Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
  • New Construction of Group Secret Handshakes Based on Pairings
  • nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
  • An Efficient Password-Only Two-Server Authenticated Key Exchange System
  • Digital Signatures
  • Formal Definition and Construction of Nominative Signature
  • Short Group Signature Without Random Oracles
  • (Convertible) Undeniable Signatures Without Random Oracles
  • Applications
  • A New Dynamic Accumulator for Batch Updates
  • Preventing Unofficial Information Propagation
  • A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction
  • Privacy Protection on Multiple Sensitive Attributes
  • Watermarking
  • Audio Watermarking Algorithm Based on Centroid and Statistical Features
  • A Semi-blind Watermarking Based on Discrete Wavelet Transform
  • Fast Implementations
  • On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme
  • High Speed Modular Divider Based on GCD Algorithm
  • MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set
  • Compact and Secure Design of Masked AES S-Box
  • Applied Cryptography
  • Boudot’s Range-Bounded Commitment Scheme Revisited
  • Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions
  • Secure Multiparty Computation of DNF
  • Cryptanalysis
  • Square Like Attack on Camellia
  • Differential Fault Analysis on CLEFIA
  • Extending FORK-256 Attack to the Full Hash Function
  • Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard
  • Formal Analysis
  • A Framework for Game-Based Security Proofs
  • What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security
  • Modeling Agreement Problems in the Universal Composability Framework
  • System Security I
  • A System Architecture for History-Based Access Control for XML Documents
  • Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
  • Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies
  • System Security II
  • A Novel Approach for Untrusted Code Execution
  • Detection and Diagnosis of Control Interception
  • BIOS Security Analysis and a Kind of Trusted BIOS
  • Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
  • Network Security
  • DDoS Attack Detection Algorithms Based on Entropy Computing
  • Firewall for Dynamic IP Address in Mobile IPv6
  • Application of the PageRank Algorithm to Alarm Graphs
  • Drive-By Pharming.