BN.com Gift Guide

Information and Communications Security: 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings

Overview

This book constitutes the refereed proceedings of the 4th International Conference on Information and Communication Security, ICICS 2002, held in Singapore in December 2002.

The 41 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on system security, crypto systems, security prools, fingerprinting and watermarking, efficient implementation of ...

See more details below
Other sellers (Paperback)
  • All (10) from $25.00   
  • New (6) from $102.93   
  • Used (4) from $25.00   
Sending request ...

Overview

This book constitutes the refereed proceedings of the 4th International Conference on Information and Communication Security, ICICS 2002, held in Singapore in December 2002.

The 41 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on system security, crypto systems, security prools, fingerprinting and watermarking, efficient implementation of algorithms, access control, and cryptanalysis and cryptographic techniques.

Read More Show Less

Product Details

  • ISBN-13: 9783540001645
  • Publisher: Springer Berlin Heidelberg
  • Publication date: 12/16/2002
  • Series: Lecture Notes in Computer Science Series , #2513
  • Edition description: 2002
  • Edition number: 1
  • Pages: 500
  • Product dimensions: 9.21 (w) x 6.14 (h) x 1.03 (d)

Table of Contents

System Security I.- Defenses against the Truncation of Computation Results of Free-Roaming Agents.- A Distributed Dynamic—Firewall Architecture with Mobile Agents and KeyNote Trust Management System.- Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack.- An Evaluation of Different IP Traceback Approaches.- Security against Inference Attacks on Negative Information in Object-Oriented Databases.- Cryptosystem I.- Robust Key-Evolving Public Key Encryption Schemes.- A Group Signature Scheme Committing the Group.- Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.- Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption.- Reducing the Memory Complexity of Type-Inference Algorithms.- Security Prool I.- The Risks of Compromising Secret Information.- Password-Authenticated Key Exchange between Clients with Different Passwords.- Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.- Attacking Predictable IPsec ESP Initialization Vectors.- Fingerprinting & Watermarking.- An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code.- A Robust Block Oriented Watermarking Scheme in Spatial Domain.- A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing.- Efficient Implementation of Algorithms.- Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fields.- Fast Elliptic Curve Multiplications with SIMD Operations.- Further Results on Multiples of Primitive Polynomials and Their Products over GF(2).- System Security II.- A Secure Object Sharing Scheme for Java Card.- IDS Interoperability and Correlation Using IDMEF and Commodity Systems.- A Synthetic Fraud Data Generation Methodology.- User Interaction Design for Secure Systems.- Using Independent Auditors as Intrusion Detection Systems.- Cryptosystem II.- Cellular Automata Based Cryptosystem (CAC).- New Weak-Key Classes of IDEA.- Risks with Raw-Key Masking — The Security Evaluation of 2-Key XCBC.- A New Statistical Testing for Symmetric Ciphers and Hash Functions.- Message Authentication Codes with Error Correcting Capabilities.- Access Control.- The Consistency of an Access Control List.- Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies.- A Specification Language for Distributed Policy Control.- Access Control Infrastructure for Digital Objects.- Security Prool II.- Distributed Key Generation as a Component of an Integrated Prool.- A Secure Agent-Mediated Payment Prool.- Cryptanalysis & Cryptographic Techniques.- Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties.- Related-Cipher Attacks.- A Chosen Plaintext Linear Attack on Block Cipher CIKS-1.- Ideal Threshold Schemes from Orthogonal Arrays.- Cryptanalysis of the Reduced-Round RC6.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)