6. ICICS 2004:
Malaga,
Spain
Javier Lopez, Sihan Qing, Eiji Okamoto (Eds.):
Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings.
Lecture Notes in Computer Science 3269 Springer 2004, ISBN 3-540-23563-9 BibTeX
- Michel Abdalla, Bogdan Warinschi:
On the Minimal Assumptions of Group Signature Schemes.
1-13
Electronic Edition (link) BibTeX
- Willy Susilo, Yi Mu, Fangguo Zhang:
Perfect Concurrent Signature Schemes.
14-26
Electronic Edition (link) BibTeX
- Javier Herranz, Germán Sáez:
New Identity-Based Ring Signature Schemes.
27-39
Electronic Edition (link) BibTeX
- Jianying Zhou:
On the Security of a Multi-party Certified Email Protocol.
40-52
Electronic Edition (link) BibTeX
- Ventzislav Nikov, Svetla Nikova, Bart Preneel:
Robust Metering Schemes for General Access Structures.
53-65
Electronic Edition (link) BibTeX
- Klaus Herrmann, Michael A. Jaeger:
PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks.
66-78
Electronic Edition (link) BibTeX
- Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
79-91
Electronic Edition (link) BibTeX
- Ratna Dutta, Rana Barua, Palash Sarkar:
Provably Secure Authenticated Tree Based Group Key Agreement.
92-104
Electronic Edition (link) BibTeX
- Yuichi Komano, Kazuo Ohta:
Taxonomic Consideration to OAEP Variants and Their Security.
105-117
Electronic Edition (link) BibTeX
- Katja Schmidt-Samoa:
Factorization-Based Fail-Stop Signatures Revisited.
118-131
Electronic Edition (link) BibTeX
- Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:
A Qualitative Evaluation of Security Patterns.
132-144
Electronic Edition (link) BibTeX
- Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara:
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.
145-157
Electronic Edition (link) BibTeX
- Sandra Ring, Eric Cole:
Volatile Memory Computer Forensics to Detect Kernel Level Compromise.
158-170
Electronic Edition (link) BibTeX
- Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels:
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.
171-186
Electronic Edition (link) BibTeX
- Rakan El-Khalil, Angelos D. Keromytis:
Hydan: Hiding Information in Program Binaries.
187-199
Electronic Edition (link) BibTeX
- Luke Hebbes, Andrew Lenaghan:
A Semi-fragile Steganographic Digital Signature for Images.
200-210
Electronic Edition (link) BibTeX
- Marcel Fernandez, Miguel Soriano:
Identification of Traitors Using a Trellis.
211-222
Electronic Edition (link) BibTeX
- Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro:
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
223-235
Electronic Edition (link) BibTeX
- Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh:
Reflector Attack Traceback System with Pushback Based iTrace Mechanism.
236-248
Electronic Edition (link) BibTeX
- Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci:
Automatic Covert Channel Analysis of a Multilevel Secure Component.
249-261
Electronic Edition (link) BibTeX
- Christopher Lynch, Catherine Meadows:
Sound Approximations to Diffie-Hellman Using Rewrite Rules.
262-277
Electronic Edition (link) BibTeX
- Anton Kargl, Götz Wiesend:
On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks.
278-290
Electronic Edition (link) BibTeX
- Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee:
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm.
291-304
Electronic Edition (link) BibTeX
- Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
305-317
Electronic Edition (link) BibTeX
- Oleksiy Mazhelis, Seppo Puuronen, Jari Veijalainen:
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection.
318-330
Electronic Edition (link) BibTeX
- Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim:
Threat Analysis on NEtwork MObility (NEMO).
331-342
Electronic Edition (link) BibTeX
- Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth:
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
343-357
Electronic Edition (link) BibTeX
- Tao Wan, Evangelos Kranakis, Paul C. van Oorschot:
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV).
358-374
Electronic Edition (link) BibTeX
- Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.
375-387
Electronic Edition (link) BibTeX
- Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Security Analysis of the Generalized Self-shrinking Generator.
388-400
Electronic Edition (link) BibTeX
- Bo-Yin Yang, Jiun-Ming Chen, Nicolas Courtois:
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
401-413
Electronic Edition (link) BibTeX
- Jean Monnerat, Serge Vaudenay:
On Some Weak Extensions of AES and BES.
414-426
Electronic Edition (link) BibTeX
- Slobodan Petrovic, Amparo Fúster-Sabater:
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario.
427-439
Electronic Edition (link) BibTeX
- Mathieu Ciet, Christophe Giraud:
Transient Fault Induction Attacks on XTR.
440-451
Electronic Edition (link) BibTeX
- Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen:
Adaptive-CCA on OpenPGP Revisited.
452-464
Electronic Edition (link) BibTeX
- Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio:
A New Key-Insulated Signature Scheme.
465-479
Electronic Edition (link) BibTeX
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow:
Secure Hierarchical Identity Based Signature and Its Application.
480-494
Electronic Edition (link) BibTeX
- Fabien Laguillaumie, Damien Vergnaud:
Multi-designated Verifiers Signatures.
495-507
Electronic Edition (link) BibTeX
- Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications.
508-519
Electronic Edition (link) BibTeX
- Kihun Hong, Souhwan Jung:
An Efficient Authentication Scheme Using Recovery Information in Signature.
520-531
Electronic Edition (link) BibTeX
- Darren Davis, Fabian Monrose, Michael K. Reiter:
Time-Scoped Searching of Encrypted Audit Logs.
532-545
Electronic Edition (link) BibTeX
- Habtamu Abie, Pål Spilling, Bent Foyn:
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
546-562
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:19:55 2009
by Michael Ley (ley@uni-trier.de)