Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings /
The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- rap...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Security and Cryptology ;
3783 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Fair Exchange
- An Evenhanded Certified Email System for Contract Signing
- Efficient ID-Based Optimistic Fair Exchange with Provable Security
- On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol
- Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery
- Digital Signatures I
- Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security
- On Delegatability of Four Designated Verifier Signatures
- PIATS: A Partially Sanitizable Signature Scheme
- Cryptographic Protocols
- Ciphertext Comparison, a New Solution to the Millionaire Problem
- Private Itemset Support Counting
- Visual Cryptographic Protocols Using the Trusted Initializer
- Admissible Interference by Typing for Cryptographic Protocols
- Cryptanalysis
- On the Security Bounds of CMC, EME, EME?+? and EME* Modes of Operation
- On the Security of Encryption Modes of MD4, MD5 and HAVAL
- Cryptanalysis of PASS II and MiniPass
- Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves
- Digital Signatures II
- Asymmetric Concurrent Signatures
- Generic Construction of (Identity-Based) Perfect Concurrent Signatures
- Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains
- Network Security
- Session Table Architecture for Defending SYN Flood Attack
- A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks
- Port Scan Behavior Diagnosis by Clustering
- Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
- Applied Cryptography
- Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails
- Secure Multicast Using Proxy Encryption
- Efficient and Non-interactive Timed-Release Encryption
- Key Management
- Security Properties of Two Authenticated Conference Key Agreement Protocols
- Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity
- Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment
- Access Control
- Enforce Mandatory Access Control Policy on XML Documents
- Network Access Control for Mobile Ad-Hoc Networks
- Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
- Applications
- Authenticating Query Results in Data Publishing
- Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
- Batching SSL/TLS Handshake Improved
- Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
- Watermarking
- Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio
- Reversible Watermark with Large Capacity Using the Predictive Coding
- System Security
- PCAV: Internet Attack Visualization on Parallel Coordinates
- Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA
- D_DIPS: An Intrusion Prevention System for Database Security.