Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Soriano, Miguel (Επιμελητής έκδοσης), Qing, Sihan (Επιμελητής έκδοσης), López, Javier (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6476
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptographic Hash Functions: Theory and Practice
  • Cryptographic Hash Functions: Theory and Practice
  • Session 1A. Access Control
  • Rewriting of SPARQL/Update Queries for Securing Data Access
  • Fine-Grained Disclosure of Access Policies
  • Session 1B. Public Key Cryptography and Cryptanalysis
  • Manger’s Attack Revisited
  • Horizontal Correlation Analysis on Exponentiation
  • Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
  • Session 1C. Security in Distributed and Mobile Systems
  • A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks
  • CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization
  • SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms
  • Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol
  • Compromise-Resilient Anti-jamming for Wireless Sensor Networks
  • Session 1D. Cryptanalysis
  • On Practical Second-Order Power Analysis Attacks for Block Ciphers
  • Consecutive S-box Lookups: A Timing Attack on SNOW 3G
  • Session 2A. Authentication
  • Efficient Authentication for Mobile and Pervasive Computing
  • Security Enhancement and Modular Treatment towards Authenticated Key Exchange
  • Federated Secret Handshakes with Support for Revocation
  • Session 2B. Fair Exchange Protocols
  • An Agent-Mediated Fair Exchange Protocol
  • A New Method for Formalizing Optimistic Fair Exchange Protocols
  • Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
  • Session 2C. Anonymity and Privacy
  • Proving Coercion-Resistance of Scantegrity II
  • Anonymity and Verifiability in Voting: Understanding (Un)Linkability
  • A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms
  • Time Warp: How Time Affects Privacy in LBSs
  • Session 2D. Software Security
  • Return-Oriented Rootkit without Returns (on the x86)
  • Experimental Threat Model Reuse with Misuse Case Diagrams
  • Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis
  • Session 3A. Proxy Cryptosystems
  • Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
  • Ciphertext Policy Attribute-Based Proxy Re-encryption
  • Session 3B. Intrusion Detection Systems
  • Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks
  • A Trust-Based IDS for the AODV Protocol
  • IDS Alert Visualization and Monitoring through Heuristic Host Selection
  • A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.