7. ICICS 2005:
Beijing,
China
Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang (Eds.):
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings.
Lecture Notes in Computer Science 3783 Springer 2005, ISBN 3-540-30934-9 BibTeX
Fair Exchange
- Kenji Imamoto, Jianying Zhou, Kouichi Sakurai:
An Evenhanded Certified Email System for Contract Signing.
1-13
Electronic Edition (link) BibTeX
- Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou:
Efficient ID-Based Optimistic Fair Exchange with Provable Security.
14-26
Electronic Edition (link) BibTeX
- J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti:
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol.
27-39
Electronic Edition (link) BibTeX
- Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai:
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
40-52
Electronic Edition (link) BibTeX
Digital Signatures I
Cryptographic Protocols
Cryptanalysis
- Raphael Chung-Wei Phan, Bok-Min Goi:
On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation.
136-146
Electronic Edition (link) BibTeX
- Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL.
147-158
Electronic Edition (link) BibTeX
- Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi:
Cryptanalysis of PASS II and MiniPass.
159-168
Electronic Edition (link) BibTeX
- Yasuyuki Sakai, Kouichi Sakurai:
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves.
169-180
Electronic Edition (link) BibTeX
Digital Signatures II
Network Security
- Xin Li, Zhenzhou Ji, Mingzeng Hu:
Session Table Architecture for Defending SYN Flood Attack.
220-230
Electronic Edition (link) BibTeX
- Song Huang, Ling Zhang, Shou-Ling Dong:
A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks.
231-242
Electronic Edition (link) BibTeX
- Lanjia Wang, Hai-Xin Duan, Xing Li:
Port Scan Behavior Diagnosis by Clustering.
243-255
Electronic Edition (link) BibTeX
- Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian:
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG).
256-268
Electronic Edition (link) BibTeX
Applied Cryptography
Key Management
Access Control
Applications
- Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou:
Authenticating Query Results in Data Publishing.
376-388
Electronic Edition (link) BibTeX
- Tieyan Li, Huafei Zhu, Yongdong Wu:
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.
389-401
Electronic Edition (link) BibTeX
- Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu:
Batching SSL/TLS Handshake Improved.
402-413
Electronic Edition (link) BibTeX
- Lucas Ballard, Seny Kamara, Fabian Monrose:
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data.
414-426
Electronic Edition (link) BibTeX
Watermarking
System Security
Copyright © Sat May 16 23:19:55 2009
by Michael Ley (ley@uni-trier.de)