Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Information and Communications...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings / edited by Hideki Imai, Guilin Wang.
Saved in:
Bibliographic Details
Corporate Author:
SpringerLink (Online service)
Other Authors:
Imai, Hideki
(Editor)
,
Wang, Guilin
(Editor)
Format:
eBook
Language:
English
Published:
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
Edition:
1st ed. 2007.
Series:
Security and Cryptology ;
4861
Springer eBook Collection.
Subjects:
Data encryption (Computer science).
Computer communication systems.
Computer security.
Management information systems.
Computer science.
Computers and civilization.
Algorithms.
Electronic resources (E-books)
Online Access:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Holdings
Description
Table of Contents
Similar Items
Staff View
Table of Contents:
Authentication and Key Exchange
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
New Construction of Group Secret Handshakes Based on Pairings
nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
An Efficient Password-Only Two-Server Authenticated Key Exchange System
Digital Signatures
Formal Definition and Construction of Nominative Signature
Short Group Signature Without Random Oracles
(Convertible) Undeniable Signatures Without Random Oracles
Applications
A New Dynamic Accumulator for Batch Updates
Preventing Unofficial Information Propagation
A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction
Privacy Protection on Multiple Sensitive Attributes
Watermarking
Audio Watermarking Algorithm Based on Centroid and Statistical Features
A Semi-blind Watermarking Based on Discrete Wavelet Transform
Fast Implementations
On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme
High Speed Modular Divider Based on GCD Algorithm
MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set
Compact and Secure Design of Masked AES S-Box
Applied Cryptography
Boudot’s Range-Bounded Commitment Scheme Revisited
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions
Secure Multiparty Computation of DNF
Cryptanalysis
Square Like Attack on Camellia
Differential Fault Analysis on CLEFIA
Extending FORK-256 Attack to the Full Hash Function
Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard
Formal Analysis
A Framework for Game-Based Security Proofs
What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security
Modeling Agreement Problems in the Universal Composability Framework
System Security I
A System Architecture for History-Based Access Control for XML Documents
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies
System Security II
A Novel Approach for Untrusted Code Execution
Detection and Diagnosis of Control Interception
BIOS Security Analysis and a Kind of Trusted BIOS
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
Network Security
DDoS Attack Detection Algorithms Based on Entropy Computing
Firewall for Dynamic IP Address in Mobile IPv6
Application of the PageRank Algorithm to Alarm Graphs
Drive-By Pharming.
Similar Items
Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
Published: (2016)
Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
Published: (2015)
Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings
Published: (2006)
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Published: (2008)
Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings
Published: (2005)