Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings / edited by Hideki Imai, Guilin Wang.

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Imai, Hideki (Editor), Wang, Guilin (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Series:Security and Cryptology ; 4861
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Authentication and Key Exchange
  • Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
  • New Construction of Group Secret Handshakes Based on Pairings
  • nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
  • An Efficient Password-Only Two-Server Authenticated Key Exchange System
  • Digital Signatures
  • Formal Definition and Construction of Nominative Signature
  • Short Group Signature Without Random Oracles
  • (Convertible) Undeniable Signatures Without Random Oracles
  • Applications
  • A New Dynamic Accumulator for Batch Updates
  • Preventing Unofficial Information Propagation
  • A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction
  • Privacy Protection on Multiple Sensitive Attributes
  • Watermarking
  • Audio Watermarking Algorithm Based on Centroid and Statistical Features
  • A Semi-blind Watermarking Based on Discrete Wavelet Transform
  • Fast Implementations
  • On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme
  • High Speed Modular Divider Based on GCD Algorithm
  • MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set
  • Compact and Secure Design of Masked AES S-Box
  • Applied Cryptography
  • Boudot’s Range-Bounded Commitment Scheme Revisited
  • Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions
  • Secure Multiparty Computation of DNF
  • Cryptanalysis
  • Square Like Attack on Camellia
  • Differential Fault Analysis on CLEFIA
  • Extending FORK-256 Attack to the Full Hash Function
  • Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard
  • Formal Analysis
  • A Framework for Game-Based Security Proofs
  • What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security
  • Modeling Agreement Problems in the Universal Composability Framework
  • System Security I
  • A System Architecture for History-Based Access Control for XML Documents
  • Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
  • Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies
  • System Security II
  • A Novel Approach for Untrusted Code Execution
  • Detection and Diagnosis of Control Interception
  • BIOS Security Analysis and a Kind of Trusted BIOS
  • Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
  • Network Security
  • DDoS Attack Detection Algorithms Based on Entropy Computing
  • Firewall for Dynamic IP Address in Mobile IPv6
  • Application of the PageRank Algorithm to Alarm Graphs
  • Drive-By Pharming.