Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings /
Corporate Author: | |
---|---|
Other Authors: | , |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edition: | 1st ed. 2007. |
Series: | Security and Cryptology ;
4861 |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-540-77048-0 |
Table of Contents:
- Authentication and Key Exchange
- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
- New Construction of Group Secret Handshakes Based on Pairings
- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
- An Efficient Password-Only Two-Server Authenticated Key Exchange System
- Digital Signatures
- Formal Definition and Construction of Nominative Signature
- Short Group Signature Without Random Oracles
- (Convertible) Undeniable Signatures Without Random Oracles
- Applications
- A New Dynamic Accumulator for Batch Updates
- Preventing Unofficial Information Propagation
- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction
- Privacy Protection on Multiple Sensitive Attributes
- Watermarking
- Audio Watermarking Algorithm Based on Centroid and Statistical Features
- A Semi-blind Watermarking Based on Discrete Wavelet Transform
- Fast Implementations
- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme
- High Speed Modular Divider Based on GCD Algorithm
- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set
- Compact and Secure Design of Masked AES S-Box
- Applied Cryptography
- Boudot’s Range-Bounded Commitment Scheme Revisited
- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions
- Secure Multiparty Computation of DNF
- Cryptanalysis
- Square Like Attack on Camellia
- Differential Fault Analysis on CLEFIA
- Extending FORK-256 Attack to the Full Hash Function
- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard
- Formal Analysis
- A Framework for Game-Based Security Proofs
- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security
- Modeling Agreement Problems in the Universal Composability Framework
- System Security I
- A System Architecture for History-Based Access Control for XML Documents
- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies
- System Security II
- A Novel Approach for Untrusted Code Execution
- Detection and Diagnosis of Control Interception
- BIOS Security Analysis and a Kind of Trusted BIOS
- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
- Network Security
- DDoS Attack Detection Algorithms Based on Entropy Computing
- Firewall for Dynamic IP Address in Mobile IPv6
- Application of the PageRank Algorithm to Alarm Graphs
- Drive-By Pharming.