Amazon cover image
Image from Amazon.com

Information and communications security : 7th international conference, ICICS 2005, Beijing, China, December 10-13, 2005 : proceedings / Sihan Qing [and others] (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 3783.Publication details: Berlin ; New York : Springer, ©2005.Description: 1 online resource (xiv, 492 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540320999
  • 3540320997
  • 3540309349
  • 9783540309345
Other title:
  • ICICS 2005
Subject(s): Genre/Form: Additional physical formats: Print version:: Information and communications security.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 I554 2005eb
Online resources:
Contents:
FAIR EXCHANGE -- An evenhanded certified email system for contract signing / Kenji Imamoto [and others] -- Efficient ID-based optimistic fair exchange with provable security / Zhenfeng Zhang [and others] -- On the quest for impartiality: design and analysis of a fair non-repudiation protocol / J. Cederquist [and others] -- Generic, optimistic, and efficient schemes for fair certified email delivery / Guilin Wang [and others] -- DIGITAL SIGNATURES I -- Cryptanalysis of a forward secure blind signature scheme with provable security / Shuhong Wang [and others] -- On delegatability of four designated verifier signatures / Yong Li [and others] -- PIATS: a partially sanitizable signature scheme / Tetsuya Izu [and others] -- CRYPTOGRAPHIC PROTOCOLS -- Ciphertext comparison, a new solution to the millionaire problem / Kun Peng [and others] -- Private itemset support counting / Sven Laur [and others] -- Visual cryptographic protocols using the trusted initializer / Hidenori Kuwakado [and others] -- Admissible interference by typing for cryptographic protocols / Alaaeddine Fellah, John Mullins -- CRYPTANALYSIS -- On the security bounds of CMC, EME, EME+ and EME* modes of operation / Raphael C.-W. Phan, Bok-Min Goi -- On the security of encryption modes of MD4, MD5 and HAVAL / Jongsung Kim [and others] -- Cryptanalysis of PASS II and MiniPass / Bok-Min Goi [and others] -- Simple power analysis on fast modular reduction with NIST recommended elliptic curves / Yasuyuki Sakai, Kouichi Sakurai -- DIGITAL SIGNATURES II -- Asymmetric concurrent signatures / Khanh Nguyen -- Generic construction of (identity-based) perfect concurrent signatures / Sherman S.M. Chow, Willy Susilo -- Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains / Huafei Zhu [and others] -- NETWORK SECURITY -- Session table architecture for defending SYN flood attack / Xin Li [and others] -- A behavior-based ingress rate-limiting mechanism against DoS/DDoS attacks / Song Huang [and others] -- Port scan behavior diagnosis by clustering / Lanjia Wang [and others] -- Network vulnerability analysis through vulnerability take-grant model (VTG) / Hamid Reza Shahriari [and others] -- APPLIED CRYPTOGRAPHY -- Multiplex encryption: a practical approach to encrypting multi-recipient emails / Wei Wei [and others] -- Secure multicast using proxy encryption / Yun-Peng Chiu [and others] -- KEY MANAGEMENT -- Security properties of two authenticated conference key agreement protocols / Qiang Tang, Chris J. Mitchell -- Cryptanalysis of two user identification schemes with key distribution preserving anonymity / Eun-Jun Yoon, Kee-Young Yoo -- Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment / Sangjin Kim [and others] -- ACCESS CONTROL -- Enforce mandatory access control policy on XML documents / Lan Li [and others] -- Network access control for mobile ad-hoc networks / Pan Wang [and others] -- Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware / Debra L. Cook [and others] -- APPLICATIONS -- Authenticating query results in data publishing / Di Ma [and others] -- Multi-source stream authentication framework in case of composite MPEG-4 stream / Tieyan Li [and others] -- Batching SSL/TLS handshake improved / Fang Qi [and others] -- Achieving efficient conjunctive keyword searches over encrypted data / Lucas Ballard [and others] -- WATERMARKING -- Total disclosure of the embedding and detection algorithms for a secure digital watermarking scheme for audio / David Megías [and others] -- Reversible watermark with large capacity using the predictive coding / Minoru Kuribayashi [and others] -- SYSTEM SECURITY -- PCAV: Internet attack visualization on parallel coordinates / Hyunsang Choi, Heejo Lee -- Implementation of packet filter configurations anomaly detection system with SIERRA / Yi Yin [and others] -- DDIPS: an intrusion prevention system for database security / Jiazhu Dai, Huaikou Miao.
Summary: The Seventh International Conference on Information and Communications - curity, ICICS2005,washeldinBeijing, China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi'an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o?er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and index.

FAIR EXCHANGE -- An evenhanded certified email system for contract signing / Kenji Imamoto [and others] -- Efficient ID-based optimistic fair exchange with provable security / Zhenfeng Zhang [and others] -- On the quest for impartiality: design and analysis of a fair non-repudiation protocol / J. Cederquist [and others] -- Generic, optimistic, and efficient schemes for fair certified email delivery / Guilin Wang [and others] -- DIGITAL SIGNATURES I -- Cryptanalysis of a forward secure blind signature scheme with provable security / Shuhong Wang [and others] -- On delegatability of four designated verifier signatures / Yong Li [and others] -- PIATS: a partially sanitizable signature scheme / Tetsuya Izu [and others] -- CRYPTOGRAPHIC PROTOCOLS -- Ciphertext comparison, a new solution to the millionaire problem / Kun Peng [and others] -- Private itemset support counting / Sven Laur [and others] -- Visual cryptographic protocols using the trusted initializer / Hidenori Kuwakado [and others] -- Admissible interference by typing for cryptographic protocols / Alaaeddine Fellah, John Mullins -- CRYPTANALYSIS -- On the security bounds of CMC, EME, EME+ and EME* modes of operation / Raphael C.-W. Phan, Bok-Min Goi -- On the security of encryption modes of MD4, MD5 and HAVAL / Jongsung Kim [and others] -- Cryptanalysis of PASS II and MiniPass / Bok-Min Goi [and others] -- Simple power analysis on fast modular reduction with NIST recommended elliptic curves / Yasuyuki Sakai, Kouichi Sakurai -- DIGITAL SIGNATURES II -- Asymmetric concurrent signatures / Khanh Nguyen -- Generic construction of (identity-based) perfect concurrent signatures / Sherman S.M. Chow, Willy Susilo -- Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains / Huafei Zhu [and others] -- NETWORK SECURITY -- Session table architecture for defending SYN flood attack / Xin Li [and others] -- A behavior-based ingress rate-limiting mechanism against DoS/DDoS attacks / Song Huang [and others] -- Port scan behavior diagnosis by clustering / Lanjia Wang [and others] -- Network vulnerability analysis through vulnerability take-grant model (VTG) / Hamid Reza Shahriari [and others] -- APPLIED CRYPTOGRAPHY -- Multiplex encryption: a practical approach to encrypting multi-recipient emails / Wei Wei [and others] -- Secure multicast using proxy encryption / Yun-Peng Chiu [and others] -- KEY MANAGEMENT -- Security properties of two authenticated conference key agreement protocols / Qiang Tang, Chris J. Mitchell -- Cryptanalysis of two user identification schemes with key distribution preserving anonymity / Eun-Jun Yoon, Kee-Young Yoo -- Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment / Sangjin Kim [and others] -- ACCESS CONTROL -- Enforce mandatory access control policy on XML documents / Lan Li [and others] -- Network access control for mobile ad-hoc networks / Pan Wang [and others] -- Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware / Debra L. Cook [and others] -- APPLICATIONS -- Authenticating query results in data publishing / Di Ma [and others] -- Multi-source stream authentication framework in case of composite MPEG-4 stream / Tieyan Li [and others] -- Batching SSL/TLS handshake improved / Fang Qi [and others] -- Achieving efficient conjunctive keyword searches over encrypted data / Lucas Ballard [and others] -- WATERMARKING -- Total disclosure of the embedding and detection algorithms for a secure digital watermarking scheme for audio / David Megías [and others] -- Reversible watermark with large capacity using the predictive coding / Minoru Kuribayashi [and others] -- SYSTEM SECURITY -- PCAV: Internet attack visualization on parallel coordinates / Hyunsang Choi, Heejo Lee -- Implementation of packet filter configurations anomaly detection system with SIERRA / Yi Yin [and others] -- DDIPS: an intrusion prevention system for database security / Jiazhu Dai, Huaikou Miao.

Print version record.

The Seventh International Conference on Information and Communications - curity, ICICS2005,washeldinBeijing, China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi'an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o?er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.

Powered by Koha