6. ICICS 2004:
Malaga,
Spain
 Javier Lopez, Sihan Qing, Eiji Okamoto (Eds.):
Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings.
Lecture Notes in Computer Science 3269 Springer 2004, ISBN 3-540-23563-9 BibTeX
 
- Michel Abdalla, Bogdan Warinschi:
On the Minimal Assumptions of Group Signature Schemes.
1-13
Electronic Edition (link) BibTeX
 - Willy Susilo, Yi Mu, Fangguo Zhang:
Perfect Concurrent Signature Schemes.
14-26
Electronic Edition (link) BibTeX
 - Javier Herranz, Germán Sáez:
New Identity-Based Ring Signature Schemes.
27-39
Electronic Edition (link) BibTeX
 - Jianying Zhou:
On the Security of a Multi-party Certified Email Protocol.
40-52
Electronic Edition (link) BibTeX
 - Ventzislav Nikov, Svetla Nikova, Bart Preneel:
Robust Metering Schemes for General Access Structures.
53-65
Electronic Edition (link) BibTeX
 - Klaus Herrmann, Michael A. Jaeger:
PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks.
66-78
Electronic Edition (link) BibTeX
 - Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
79-91
Electronic Edition (link) BibTeX
 - Ratna Dutta, Rana Barua, Palash Sarkar:
Provably Secure Authenticated Tree Based Group Key Agreement.
92-104
Electronic Edition (link) BibTeX
 - Yuichi Komano, Kazuo Ohta:
Taxonomic Consideration to OAEP Variants and Their Security.
105-117
Electronic Edition (link) BibTeX
 - Katja Schmidt-Samoa:
Factorization-Based Fail-Stop Signatures Revisited.
118-131
Electronic Edition (link) BibTeX
 - Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:
A Qualitative Evaluation of Security Patterns.
132-144
Electronic Edition (link) BibTeX
 - Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara:
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.
145-157
Electronic Edition (link) BibTeX
 - Sandra Ring, Eric Cole:
Volatile Memory Computer Forensics to Detect Kernel Level Compromise.
158-170
Electronic Edition (link) BibTeX
 - Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels:
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.
171-186
Electronic Edition (link) BibTeX
 - Rakan El-Khalil, Angelos D. Keromytis:
Hydan: Hiding Information in Program Binaries.
187-199
Electronic Edition (link) BibTeX
 - Luke Hebbes, Andrew Lenaghan:
A Semi-fragile Steganographic Digital Signature for Images.
200-210
Electronic Edition (link) BibTeX
 - Marcel Fernandez, Miguel Soriano:
Identification of Traitors Using a Trellis.
211-222
Electronic Edition (link) BibTeX
 - Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro:
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
223-235
Electronic Edition (link) BibTeX
 - Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh:
Reflector Attack Traceback System with Pushback Based iTrace Mechanism.
236-248
Electronic Edition (link) BibTeX
 - Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci:
Automatic Covert Channel Analysis of a Multilevel Secure Component.
249-261
Electronic Edition (link) BibTeX
 - Christopher Lynch, Catherine Meadows:
Sound Approximations to Diffie-Hellman Using Rewrite Rules.
262-277
Electronic Edition (link) BibTeX
 - Anton Kargl, Götz Wiesend:
On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks.
278-290
Electronic Edition (link) BibTeX
 - Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee:
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm.
291-304
Electronic Edition (link) BibTeX
 - Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
305-317
Electronic Edition (link) BibTeX
 - Oleksiy Mazhelis, Seppo Puuronen, Jari Veijalainen:
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection.
318-330
Electronic Edition (link) BibTeX
 - Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim:
Threat Analysis on NEtwork MObility (NEMO).
331-342
Electronic Edition (link) BibTeX
 - Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth:
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
343-357
Electronic Edition (link) BibTeX
 - Tao Wan, Evangelos Kranakis, Paul C. van Oorschot:
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV).
358-374
Electronic Edition (link) BibTeX
 - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.
375-387
Electronic Edition (link) BibTeX
 - Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Security Analysis of the Generalized Self-shrinking Generator.
388-400
Electronic Edition (link) BibTeX
 - Bo-Yin Yang, Jiun-Ming Chen, Nicolas Courtois:
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
401-413
Electronic Edition (link) BibTeX
 - Jean Monnerat, Serge Vaudenay:
On Some Weak Extensions of AES and BES.
414-426
Electronic Edition (link) BibTeX
 - Slobodan Petrovic, Amparo Fúster-Sabater:
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario.
427-439
Electronic Edition (link) BibTeX
 - Mathieu Ciet, Christophe Giraud:
Transient Fault Induction Attacks on XTR.
440-451
Electronic Edition (link) BibTeX
 - Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen:
Adaptive-CCA on OpenPGP Revisited.
452-464
Electronic Edition (link) BibTeX
 - Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio:
A New Key-Insulated Signature Scheme.
465-479
Electronic Edition (link) BibTeX
 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow:
Secure Hierarchical Identity Based Signature and Its Application.
480-494
Electronic Edition (link) BibTeX
 - Fabien Laguillaumie, Damien Vergnaud:
Multi-designated Verifiers Signatures.
495-507
Electronic Edition (link) BibTeX
 - Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications.
508-519
Electronic Edition (link) BibTeX
 - Kihun Hong, Souhwan Jung:
An Efficient Authentication Scheme Using Recovery Information in Signature.
520-531
Electronic Edition (link) BibTeX
 - Darren Davis, Fabian Monrose, Michael K. Reiter:
Time-Scoped Searching of Encrypted Audit Logs.
532-545
Electronic Edition (link) BibTeX
 - Habtamu Abie, Pål Spilling, Bent Foyn:
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
546-562
Electronic Edition (link) BibTeX
 
Copyright © Sat May 16 23:19:55 2009
 by Michael Ley (ley@uni-trier.de)