Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings

Author:   Petra Perner ,  Dieter Gollmann ,  Jianying Zhou ,  Petra Perner
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2003 ed.
Volume:   2836
ISBN:  

9783540201502


Pages:   418
Publication Date:   29 September 2003
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.07 Quantity:  
Add to Cart

Share |

Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003.The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic protocols, oblivious transfer, fingerprinting schemes, security verification, TCP/IP security, support vector machine, intrusion detection, and authenticated encryption schemes.

Full Product Details

Author:   Petra Perner ,  Dieter Gollmann ,  Jianying Zhou ,  Petra Perner
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2003 ed.
Volume:   2836
Dimensions:   Width: 15.20cm , Height: 2.20cm , Length: 22.90cm
Weight:   1.340kg
ISBN:  

9783540201502


ISBN 10:   3540201505
Pages:   418
Publication Date:   29 September 2003
Audience:   General/trade ,  College/higher education ,  Professional and scholarly ,  General ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

A Fast Square Root Computation Using the Frobenius Mapping.- A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.- Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents.- On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.- A Policy Based Framework for Access Control.- Trading-Off Type-Inference Memory Complexity against Communication.- Security Remarks on a Group Signature Scheme with Member Deletion.- An Efficient Known Plaintext Attack on FEA-M.- An Efficient Public-Key Framework.- ROCEM: Robust Certified E-mail System Based on Server-Supported Signature.- Practical Service Charge for P2P Content Distribution.- ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback.- A Lattice Based General Blind Watermark Scheme.- Role-Based Access Control and the Access Control Matrix.- Broadcast Encryption Schemes Based on the Sectioned Key Tree.- Research on the Collusion Estimation.- Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains.- Protocols for Malicious Host Revocation.- A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code.- A Novel Two-Level Trust Model for Grid.- Practical t-out-n Oblivious Transfer and Its Applications.- Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.- ID-Based Distributed Magic Ink Signature from Pairings.- A Simple Anonymous Fingerprinting Scheme Based on Blind Signature.- Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.- A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems.- A Novel Efficient Group Signature Scheme with Forward Security.- Variations of Diffie-Hellman Problem.- A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.- A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.- UC-RBAC: A Usage Constrained Role-Based Access Control Model.- (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography.- An Optimized Multi-bits Blind Watermarking Scheme.- A Compound Intrusion Detection Model.- An Efficient Convertible Authenticated Encryption Scheme and Its Variant.- Space-Economical Reassembly for Intrusion Detection System.- A Functional Decomposition of Virus and Worm Programs.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List