Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings

Author:   Hideki Imai ,  Guilin Wang ,  Wang Guilin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2007 ed.
Volume:   4861
ISBN:  

9783540770473


Pages:   514
Publication Date:   29 November 2007
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $237.47 Quantity:  
Add to Cart

Share |

Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The papers presented were carefully reviewed and selected. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.

Full Product Details

Author:   Hideki Imai ,  Guilin Wang ,  Wang Guilin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2007 ed.
Volume:   4861
Dimensions:   Width: 15.50cm , Height: 2.60cm , Length: 23.50cm
Weight:   0.801kg
ISBN:  

9783540770473


ISBN 10:   354077047
Pages:   514
Publication Date:   29 November 2007
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Authentication and Key Exchange.- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures.- New Construction of Group Secret Handshakes Based on Pairings.- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.- An Efficient Password-Only Two-Server Authenticated Key Exchange System.- Digital Signatures.- Formal Definition and Construction of Nominative Signature.- Short Group Signature Without Random Oracles.- (Convertible) Undeniable Signatures Without Random Oracles.- Applications.- A New Dynamic Accumulator for Batch Updates.- Preventing Unofficial Information Propagation.- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction.- Privacy Protection on Multiple Sensitive Attributes.- Watermarking.- Audio Watermarking Algorithm Based on Centroid and Statistical Features.- A Semi-blind Watermarking Based on Discrete Wavelet Transform.- Fast Implementations.- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme.- High Speed Modular Divider Based on GCD Algorithm.- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.- Compact and Secure Design of Masked AES S-Box.- Applied Cryptography.- Boudot’s Range-Bounded Commitment Scheme Revisited.- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.- Secure Multiparty Computation of DNF.- Cryptanalysis.- Square Like Attack on Camellia.- Differential Fault Analysis on CLEFIA.- Extending FORK-256 Attack to the Full Hash Function.- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard.- Formal Analysis.- A Framework for Game-Based Security Proofs.- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security.- Modeling Agreement Problems in the Universal Composability Framework.- System Security I.- A System Architecture for History-Based Access Control for XML Documents.- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.- System Security II.- A Novel Approach for Untrusted Code Execution.- Detection and Diagnosis of Control Interception.- BIOS Security Analysis and a Kind of Trusted BIOS.- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.- Network Security.- DDoS Attack Detection Algorithms Based on Entropy Computing.- Firewall for Dynamic IP Address in Mobile IPv6.- Application of the PageRank Algorithm to Alarm Graphs.- Drive-By Pharming.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List