5. ICICS 2003:
Huhehaote,
China
Sihan Qing, Dieter Gollmann, Jianying Zhou (Eds.):
Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings.
Lecture Notes in Computer Science 2836 Springer 2003, ISBN 3-540-20150-5 BibTeX
@proceedings{DBLP:conf/icics/2003,
editor = {Sihan Qing and
Dieter Gollmann and
Jianying Zhou},
title = {Information and Communications Security, 5th International Conference,
ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
booktitle = {ICICS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2836},
year = {2003},
isbn = {3-540-20150-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa:
A Fast Square Root Computation Using the Frobenius Mapping.
1-10
Electronic Edition (link) BibTeX
- Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim:
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.
11-21
Electronic Edition (link) BibTeX
- Yan Wang, Chi-Hung Chi, Tieyan Li:
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents.
22-33
Electronic Edition (link) BibTeX
- Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei:
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.
34-46
Electronic Edition (link) BibTeX
- Ricardo Nabhen, Edgard Jamhour, Carlos Maziero:
A Policy Based Framework for Access Control.
47-59
Electronic Edition (link) BibTeX
- Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine:
Trading-Off Type-Inference Memory Complexity against Communication.
60-71
Electronic Edition (link) BibTeX
- Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Remarks on a Group Signature Scheme with Member Deletion.
72-83
Electronic Edition (link) BibTeX
- Hongjun Wu, Feng Bao, Robert H. Deng:
An Efficient Known Plaintext Attack on FEA-M.
84-87
Electronic Edition (link) BibTeX
- Jianying Zhou, Feng Bao, Robert H. Deng:
An Efficient Public-Key Framework.
88-99
Electronic Edition (link) BibTeX
- Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee:
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature.
100-111
Electronic Edition (link) BibTeX
- Jose Antonio Onieva, Jianying Zhou, Javier Lopez:
Practical Service Charge for P2P Content Distribution.
112-123
Electronic Edition (link) BibTeX
- Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma:
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback.
124-135
Electronic Edition (link) BibTeX
- Yongliang Liu, Wen Gao, Zhao Wang, Shaohui Liu:
A Lattice Based General Blind Watermark Scheme.
136-144
Electronic Edition (link) BibTeX
- Gregory Saunders, Michael Hitchens, Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix.
145-157
Electronic Edition (link) BibTeX
- Miodrag J. Mihaljevic:
Broadcast Encryption Schemes Based on the Sectioned Key Tree.
158-169
Electronic Edition (link) BibTeX
- Gang Li, Jie Yang:
Research on the Collusion Estimation.
170-178
Electronic Edition (link) BibTeX
- Mohsen Ashourian, Yo-Sung Ho:
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains.
179-190
Electronic Edition (link) BibTeX
- Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné:
Protocols for Malicious Host Revocation.
191-201
Electronic Edition (link) BibTeX
- Pat Pik-Wah Chan, Michael R. Lyu:
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code.
202-213
Electronic Edition (link) BibTeX
- Tieyan Li, Huafei Zhu, Kwok-Yan Lam:
A Novel Two-Level Trust Model for Grid.
214-225
Electronic Edition (link) BibTeX
- Qianhong Wu, Jianhong Zhang, Yumin Wang:
Practical t-out-n Oblivious Transfer and Its Applications.
226-237
Electronic Edition (link) BibTeX
- Yongdong Wu, Robert H. Deng:
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.
238-248
Electronic Edition (link) BibTeX
- Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim:
ID-Based Distributed "Magic Ink" Signature from Pairings.
249-259
Electronic Edition (link) BibTeX
- Yan Wang, Shuwang Lü, Zhenhua Liu:
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature.
260-268
Electronic Edition (link) BibTeX
- Yang Cui, Kazukuni Kobara, Hideki Imai:
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.
269-279
Electronic Edition (link) BibTeX
- Xiaodong Yi, Xuejun Yang:
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems.
280-291
Electronic Edition (link) BibTeX
- Jianhong Zhang, Qianhong Wu, Yumin Wang:
A Novel Efficient Group Signature Scheme with Forward Security.
292-300
Electronic Edition (link) BibTeX
- Feng Bao, Robert H. Deng, Huafei Zhu:
Variations of Diffie-Hellman Problem.
301-312
Electronic Edition (link) BibTeX
- Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.
313-324
Electronic Edition (link) BibTeX
- Min Luo, Lina Wang, Huanguo Zhang, Jin Chen:
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.
325-336
Electronic Edition (link) BibTeX
- Zhen Xu, Dengguo Feng, Lan Li, Hua Chen:
UC-RBAC: A Usage Constrained Role-Based Access Control Model.
337-347
Electronic Edition (link) BibTeX
- Mathieu Ciet, Marc Joye:
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography.
348-359
Electronic Edition (link) BibTeX
- Xiaoqiang Li, Xiangyang Xue, Wei Li:
An Optimized Multi-bits Blind Watermarking Scheme.
360-369
Electronic Edition (link) BibTeX
- Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han:
A Compound Intrusion Detection Model.
370-381
Electronic Edition (link) BibTeX
- Hui-Feng Huang, Chin-Chen Chang:
An Efficient Convertible Authenticated Encryption Scheme and Its Variant.
382-392
Electronic Edition (link) BibTeX
- Meng Zhang, Jiubin Ju:
Space-Economical Reassembly for Intrusion Detection System.
393-404
Electronic Edition (link) BibTeX
- J. Krishna Murthy:
A Functional Decomposition of Virus and Worm Programs.
405-414
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:19:55 2009
by Michael Ley (ley@uni-trier.de)