Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings / Edition 1

Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings / Edition 1

by Petra Perner
     
 

ISBN-10: 3540201505

ISBN-13: 9783540201502

Pub. Date: 11/13/2003

Publisher: Springer Berlin Heidelberg

This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003.

The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security

…  See more details below

Overview

This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003.

The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic prools, oblivious transfer, fingerprinting schemes, security verification, TCP/IP security, support vector machine, intrusion detection, and authenticated encryption schemes.

Product Details

ISBN-13:
9783540201502
Publisher:
Springer Berlin Heidelberg
Publication date:
11/13/2003
Series:
Lecture Notes in Computer Science Series, #2836
Edition description:
2003
Pages:
418
Product dimensions:
9.21(w) x 6.14(h) x 0.89(d)

Table of Contents

A Fast Square Root Computation Using the Frobenius Mapping.- A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.- Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents.- On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.- A Policy Based Framework for Access Control.- Trading-Off Type-Inference Memory Complexity against Communication.- Security Remarks on a Group Signature Scheme with Member Deletion.- An Efficient Known Plaintext Attack on FEA-M.- An Efficient Public-Key Framework.- ROCEM: Robust Certified E-mail System Based on Server-Supported Signature.- Practical Service Charge for P2P Content Distribution.- ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback.- A Lattice Based General Blind Watermark Scheme.- Role-Based Access Control and the Access Control Matrix.- Broadcast Encryption Schemes Based on the Sectioned Key Tree.- Research on the Collusion Estimation.- Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains.- Prools for Malicious Host Revocation.- A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code.- A Novel Two-Level Trust Model for Grid.- Practical t-out-n Oblivious Transfer and Its Applications.- Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.- ID-Based Distributed “Magic Ink” Signature from Pairings.- A Simple Anonymous Fingerprinting Scheme Based on Blind Signature.- Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.- A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems.- A Novel Efficient Group Signature Scheme with Forward Security.- Variations of Diffie-Hellman Problem.- A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.- A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.- UC-RBAC: A Usage Constrained Role-Based Access Control Model.- (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography.- An Optimized Multi-bits Blind Watermarking Scheme.- A Compound Intrusion Detection Model.- An Efficient Convertible Authenticated Encryption Scheme and Its Variant.- Space-Economical Reassembly for Intrusion Detection System.- A Functional Decomposition of Virus and Worm Programs.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >