Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings

Pirmais vāks
Sihan Qing
Springer Science & Business Media, 2005. gada 30. nov. - 492 lappuses
The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi’an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o?er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.

No grāmatas satura

Atlasītās lappuses

Saturs

Fair Exchange
1
Efficient IDBased Optimistic Fair Exchange with Provable Security
14
Design and Analysis of a Fair
27
Generic Optimistic and Efficient Schemes for Fair Certified Email
40
Cryptanalysis of a Forward Secure Blind Signature Scheme with
53
A Partially Sanitizable Signature Scheme
72
Private Itemset Support Counting
97
Visual Cryptographic Protocols Using the Trusted Initializer
112
Port Scan Behavior Diagnosis by Clustering
243
Network Vulnerability Analysis Through Vulnerability TakeGrant
256
Applied Cryptography
269
Efficient and Noninteractive TimedRelease Encryption
291
Key Management
304
Enhanced IDBased Authenticated Key Agreement Protocols for
323
Access Control
336
Network Access Control for Mobile AdHoc Networks
350

Admissible Interference by Typing for Cryptographic Protocols
123
Cryptanalysis
136
On the Security of Encryption Modes of MD4 MD5 and HAVAL
147
Cryptanalysis of PASS II and MiniPass
159
Simple Power Analysis on Fast Modular Reduction with NIST
169
Digital Signatures II
181
Generic Construction of IdentityBased Perfect Concurrent Signatures
194
Sequential Aggregate Signatures Working over Independent
207
Network Security
220
A BehaviorBased Ingress RateLimiting Mechanism Against
231
Remotely Keyed Cryptographics Secure Remote Display Access Using
363
Authenticating Query Results in Data Publishing
376
MultiSource Stream Authentication Framework in Case of Composite
389
Batching SSLTLS Handshake Improved
402
Watermarking
427
Reversible Watermark with Large Capacity Using the Predictive Coding
441
System Security
454
Implementation of Packet Filter Configurations Anomaly Detection
467
An Intrusion Prevention System for Database Security
481
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Bibliogrāfiskā informācija