Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Lecture Notes in Computer Science,
6476 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Cryptographic Hash Functions: Theory and Practice
- Cryptographic Hash Functions: Theory and Practice
- Session 1A. Access Control
- Rewriting of SPARQL/Update Queries for Securing Data Access
- Fine-Grained Disclosure of Access Policies
- Session 1B. Public Key Cryptography and Cryptanalysis
- Manger’s Attack Revisited
- Horizontal Correlation Analysis on Exponentiation
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Session 1C. Security in Distributed and Mobile Systems
- A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks
- CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization
- SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms
- Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol
- Compromise-Resilient Anti-jamming for Wireless Sensor Networks
- Session 1D. Cryptanalysis
- On Practical Second-Order Power Analysis Attacks for Block Ciphers
- Consecutive S-box Lookups: A Timing Attack on SNOW 3G
- Session 2A. Authentication
- Efficient Authentication for Mobile and Pervasive Computing
- Security Enhancement and Modular Treatment towards Authenticated Key Exchange
- Federated Secret Handshakes with Support for Revocation
- Session 2B. Fair Exchange Protocols
- An Agent-Mediated Fair Exchange Protocol
- A New Method for Formalizing Optimistic Fair Exchange Protocols
- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
- Session 2C. Anonymity and Privacy
- Proving Coercion-Resistance of Scantegrity II
- Anonymity and Verifiability in Voting: Understanding (Un)Linkability
- A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms
- Time Warp: How Time Affects Privacy in LBSs
- Session 2D. Software Security
- Return-Oriented Rootkit without Returns (on the x86)
- Experimental Threat Model Reuse with Misuse Case Diagrams
- Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis
- Session 3A. Proxy Cryptosystems
- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
- Ciphertext Policy Attribute-Based Proxy Re-encryption
- Session 3B. Intrusion Detection Systems
- Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks
- A Trust-Based IDS for the AODV Protocol
- IDS Alert Visualization and Monitoring through Heuristic Host Selection
- A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.