Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, ProceedingsSihan Qing Springer Science & Business Media, 2005. gada 30. nov. - 492 lappuses The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi’an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o?er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security. |
No grāmatas satura
1.–5. rezultāts no 81.
10. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
12. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
13. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
28. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
32. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
Fair Exchange | 1 |
Efficient IDBased Optimistic Fair Exchange with Provable Security | 14 |
Design and Analysis of a Fair | 27 |
Generic Optimistic and Efficient Schemes for Fair Certified Email | 40 |
Cryptanalysis of a Forward Secure Blind Signature Scheme with | 53 |
A Partially Sanitizable Signature Scheme | 72 |
Private Itemset Support Counting | 97 |
Visual Cryptographic Protocols Using the Trusted Initializer | 112 |
Port Scan Behavior Diagnosis by Clustering | 243 |
Network Vulnerability Analysis Through Vulnerability TakeGrant | 256 |
Applied Cryptography | 269 |
Efficient and Noninteractive TimedRelease Encryption | 291 |
Key Management | 304 |
Enhanced IDBased Authenticated Key Agreement Protocols for | 323 |
Access Control | 336 |
Network Access Control for Mobile AdHoc Networks | 350 |
Admissible Interference by Typing for Cryptographic Protocols | 123 |
Cryptanalysis | 136 |
On the Security of Encryption Modes of MD4 MD5 and HAVAL | 147 |
Cryptanalysis of PASS II and MiniPass | 159 |
Simple Power Analysis on Fast Modular Reduction with NIST | 169 |
Digital Signatures II | 181 |
Generic Construction of IdentityBased Perfect Concurrent Signatures | 194 |
Sequential Aggregate Signatures Working over Independent | 207 |
Network Security | 220 |
A BehaviorBased Ingress RateLimiting Mechanism Against | 231 |
Remotely Keyed Cryptographics Secure Remote Display Access Using | 363 |
Authenticating Query Results in Data Publishing | 376 |
MultiSource Stream Authentication Framework in Case of Composite | 389 |
Batching SSLTLS Handshake Improved | 402 |
Watermarking | 427 |
Reversible Watermark with Large Capacity Using the Predictive Coding | 441 |
System Security | 454 |
Implementation of Packet Filter Configurations Anomaly Detection | 467 |
An Intrusion Prevention System for Database Security | 481 |
Citi izdevumi - Skatīt visu
Information and Communications Security: 7th International Conference, ICICS ... Sihan Qing Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
access control Advances in Cryptology aggregate signature algorithm Alice attack authentication certified email ciphertext Client commitment scheme Computer Science concurrent signature cryptographic Cryptology cryptosystem database decryption denote designated verifier detection digital signature efficient extra reduction fair exchange G₁ group key hash function ID-based IEEE implementation input intruder itemset key agreement keystone label Lecture Notes LNCS local subgroup MAC policy multicast nodes non-repudiation Notes in Computer Nth root oblivious transfer operations outputs packet pair paper parameters pixels plaintext polynomial private key probabilistic promise of signature proof proposed protocol proxy public key queries random oracle random oracle model receiver related-key result routers sanitizations scan secret key security view sender sends server session key signature scheme signer Springer-Verlag Take-Grant model trapdoor tuple valid vulnerabilities XML documents