4. ICICS 2002:
Singapore
Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou (Eds.):
Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings.
Lecture Notes in Computer Science 2513 Springer 2002, ISBN 3-540-00164-6 BibTeX
@proceedings{DBLP:conf/icics/2002,
editor = {Robert H. Deng and
Sihan Qing and
Feng Bao and
Jianying Zhou},
title = {Information and Communications Security, 4th International Conference,
ICICS 2002, Singapore, December 9-12, 2002, Proceedings},
booktitle = {ICICS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2513},
year = {2002},
isbn = {3-540-00164-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
System Security I
Cryptosystem I
- Wen-Guey Tzeng, Zhi-Jia Tzeng:
Robust Key-Evolving Public Key Encryption Schemes.
61-72
Electronic Edition (Springer LINK) BibTeX
- Toru Nakanishi, Masayuki Tao, Yuji Sugiyama:
A Group Signature Scheme Committing the Group.
73-84
Electronic Edition (Springer LINK) BibTeX
- Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
85-96
Electronic Edition (Springer LINK) BibTeX
- Myungsun Kim, Jongseong Kim, Kwangjo Kim:
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption.
97-108
Electronic Edition (Springer LINK) BibTeX
- David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina:
Reducing the Memory Complexity of Type-Inference Algorithms.
109-121
Electronic Edition (Springer LINK) BibTeX
Security Protocol I
Fingerprinting & Watermaking
Efficient Implementation of Algorithms
System Security II
Cryptosystems II
- Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri:
Cellular Automata Based Cryptosystem (CAC).
303-314
Electronic Edition (Springer LINK) BibTeX
- Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
New Weak-Key Classes of IDEA.
315-326
Electronic Edition (Springer LINK) BibTeX
- Soichi Furuya, Kouichi Sakurai:
Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC.
327-341
Electronic Edition (Springer LINK) BibTeX
- Eric Filiol:
A New Statistical Testing for Symmetric Ciphers and Hash Functions.
342-353
Electronic Edition (Springer LINK) BibTeX
- Charles C. Y. Lam, Guang Gong, Scott A. Vanstone:
Message Authentication Codes with Error Correcting Capabilities.
354-366
Electronic Edition (Springer LINK) BibTeX
Access Control
- Shou-peng Li, Shi-zhong Wu, Tao Guo:
The Consistency of an Access Control List.
367-373
Electronic Edition (Springer LINK) BibTeX
- Jong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim:
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies.
374-385
Electronic Edition (Springer LINK) BibTeX
- Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki:
A Specification Language for Distributed Policy Control.
386-398
Electronic Edition (Springer LINK) BibTeX
- Javier Lopez, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle:
Access Control Infrastructure for Digital Objects.
399-410
Electronic Edition (Springer LINK) BibTeX
Security Protocol II
Cryptanalysis & Cryptographic Techniques
Copyright © Sat May 16 23:19:54 2009
by Michael Ley (ley@uni-trier.de)