Sihan Qing (Volume ed.) / Hideki Imai / Guilin Wang
Information and Communications Security
9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings
Herausgegeben:Imai, Hideki; Wang, Guilin
Sihan Qing (Volume ed.) / Hideki Imai / Guilin Wang
Information and Communications Security
9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings
Herausgegeben:Imai, Hideki; Wang, Guilin
- Broschiertes Buch
Andere Kunden interessierten sich auch für
- Matthew Franklin / Lucas Chi-Kwong Hui / Duncan S. Wong (Volume editor)Cryptology and Network Security37,99 €
- Sihan Qing / Wenbo Mao / Javier Lopez / Guilin Wang (eds.)Information and Communications Security42,99 €
- Information Theoretic Security42,99 €
- Carlisle Adams / Ali Miri / Michael Wiener (eds.)Selected Areas in Cryptography37,99 €
- Post-Quantum Cryptography44,99 €
- Kyo-Il Chung / Kiwook Sohn / Moti Yung (Volume editor)Information Security Applications37,99 €
- Dengguo Feng / Dongdai Lin / Moti Yung (eds.)Information Security and Cryptology42,99 €
-
-
-
Produktdetails
- Lecture Notes in Computer Science 4861
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-540-77047-3
- Seitenzahl: 514
- Englisch
- Abmessung: 28mm x 155mm x 235mm
- Gewicht: 791g
- ISBN-13: 9783540770473
- ISBN-10: 354077047X
- Artikelnr.: 23302063
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Authentication and Key Exchange.- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures.- New Construction of Group Secret Handshakes Based on Pairings.- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.- An Efficient Password-Only Two-Server Authenticated Key Exchange System.- Digital Signatures.- Formal Definition and Construction of Nominative Signature.- Short Group Signature Without Random Oracles.- (Convertible) Undeniable Signatures Without Random Oracles.- Applications.- A New Dynamic Accumulator for Batch Updates.- Preventing Unofficial Information Propagation.- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction.- Privacy Protection on Multiple Sensitive Attributes.- Watermarking.- Audio Watermarking Algorithm Based on Centroid and Statistical Features.- A Semi-blind Watermarking Based on Discrete Wavelet Transform.- Fast Implementations.- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme.- High Speed Modular Divider Based on GCD Algorithm.- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.- Compact and Secure Design of Masked AES S-Box.- Applied Cryptography.- Boudot's Range-Bounded Commitment Scheme Revisited.- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.- Secure Multiparty Computation of DNF.- Cryptanalysis.- Square Like Attack on Camellia.- Differential Fault Analysis on CLEFIA.- Extending FORK-256 Attack to the Full Hash Function.- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard.- Formal Analysis.- A Framework for Game-Based Security Proofs.- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security.- Modeling Agreement Problems in the Universal Composability Framework.- System Security I.- A System Architecture for History-Based Access Control for XML Documents.- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.- System Security II.- A Novel Approach for Untrusted Code Execution.- Detection and Diagnosis of Control Interception.- BIOS Security Analysis and a Kind of Trusted BIOS.- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.- Network Security.- DDoS Attack Detection Algorithms Based on Entropy Computing.- Firewall for Dynamic IP Address in Mobile IPv6.- Application of the PageRank Algorithm to Alarm Graphs.- Drive-By Pharming.
Authentication and Key Exchange.- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures.- New Construction of Group Secret Handshakes Based on Pairings.- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.- An Efficient Password-Only Two-Server Authenticated Key Exchange System.- Digital Signatures.- Formal Definition and Construction of Nominative Signature.- Short Group Signature Without Random Oracles.- (Convertible) Undeniable Signatures Without Random Oracles.- Applications.- A New Dynamic Accumulator for Batch Updates.- Preventing Unofficial Information Propagation.- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction.- Privacy Protection on Multiple Sensitive Attributes.- Watermarking.- Audio Watermarking Algorithm Based on Centroid and Statistical Features.- A Semi-blind Watermarking Based on Discrete Wavelet Transform.- Fast Implementations.- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme.- High Speed Modular Divider Based on GCD Algorithm.- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.- Compact and Secure Design of Masked AES S-Box.- Applied Cryptography.- Boudot's Range-Bounded Commitment Scheme Revisited.- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.- Secure Multiparty Computation of DNF.- Cryptanalysis.- Square Like Attack on Camellia.- Differential Fault Analysis on CLEFIA.- Extending FORK-256 Attack to the Full Hash Function.- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard.- Formal Analysis.- A Framework for Game-Based Security Proofs.- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security.- Modeling Agreement Problems in the Universal Composability Framework.- System Security I.- A System Architecture for History-Based Access Control for XML Documents.- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.- System Security II.- A Novel Approach for Untrusted Code Execution.- Detection and Diagnosis of Control Interception.- BIOS Security Analysis and a Kind of Trusted BIOS.- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.- Network Security.- DDoS Attack Detection Algorithms Based on Entropy Computing.- Firewall for Dynamic IP Address in Mobile IPv6.- Application of the PageRank Algorithm to Alarm Graphs.- Drive-By Pharming.