Cargando…

Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings /

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Ning, Peng (Editor ), Li, Ninghui (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 4307
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Security Protocols
  • Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
  • A Robust and Secure RFID-Based Pedigree System (Short Paper)
  • A Topological Condition for Solving Fair Exchange in Byzantine Environments
  • A Security Analysis of the Precise Time Protocol (Short Paper)
  • Applied Crytography
  • An Identity-Based Proxy Signature Scheme from Pairings
  • Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper)
  • Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)
  • Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size
  • Trace-Driven Cache Attacks on AES (Short Paper)
  • Access Control and Systems Security
  • A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols
  • Defining and Measuring Policy Coverage in Testing Access Control Policies
  • Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper)
  • An Operating System Design for the Security Architecture for Microprocessors
  • Privacy and Malicious Code
  • Point-Based Trust: Define How Much Privacy Is Worth
  • Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets
  • Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)
  • An Anonymous Authentication Scheme for Identification Card
  • A Wireless Covert Channel on Smart Cards (Short Paper)
  • Network Security
  • From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution
  • Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)
  • An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper)
  • Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario
  • An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)
  • Systems Security
  • Provably Correct Runtime Enforcement of Non-interference Properties
  • An Attack on SMC-Based Software Protection
  • Modular Behavior Profiles in Systems with Shared Libraries (Short Paper)
  • Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic
  • Cryptanalysis
  • Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards
  • Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)
  • Seifert's RSA Fault Attack: Simplified Analysis and Generalizations
  • The Fairness of Perfect Concurrent Signatures
  • Applied Cryptography and Network Security
  • Secure Set Membership Using 3Sat
  • Left-to-Right Signed-Bit ?-Adic Representations of n Integers (Short Paper)
  • Universal Designated Verifier Signature Without Delegatability
  • Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper)
  • Security Implementations
  • A Fast RSA Implementation on Itanium 2 Processor
  • Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)
  • Threshold Implementations Against Side-Channel Attacks and Glitches
  • Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper).