Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings

Bibliographic Details
Other Authors: López, Javier (Editor), Okamoto, Eiji (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2004, 2004
Edition:1st ed. 2004
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • A Semi-fragile Steganographic Digital Signature for Images
  • Identification of Traitors Using a Trellis
  • Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation
  • Reflector Attack Traceback System with Pushback Based iTrace Mechanism
  • Automatic Covert Channel Analysis of a Multilevel Secure Component
  • Sound Approximations to Diffie-Hellman Using Rewrite Rules
  • On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks
  • New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm
  • Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure
  • Modelling Dependencies Between Classifiers in Mobile Masquerader Detection
  • Threat Analysis on NEtwork MObility (NEMO)
  • Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub InfrastructureConcept
  • Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
  • Secret-Public Storage Trade-Off for Broadcast Encryption Key Management
  • Security Analysis of the Generalized Self-shrinking Generator
  • On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis
  • On Some Weak Extensions of AES and BES
  • Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario
  • Transient Fault Induction Attacks on XTR
  • Adaptive-CCA on OpenPGP Revisited
  • A New Key-Insulated Signature Scheme
  • Secure Hierarchical Identity Based Signature and Its Application
  • Multi-designated Verifiers Signatures
  • Dynamic Access Control for Multi-privileged Group Communications
  • An Efficient Authentication Scheme Using Recovery Information in Signature
  • Time-Scoped Searching of Encrypted Audit Logs
  • Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems
  • On the Minimal Assumptions of Group Signature Schemes
  • Perfect Concurrent Signature Schemes
  • New Identity-Based Ring Signature Schemes
  • On the Security of a Multi-party Certified Email Protocol
  • Robust Metering Schemes for General Access Structures
  • PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks
  • Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN
  • Provably Secure Authenticated Tree Based Group Key Agreement
  • Taxonomic Consideration to OAEP Variants and Their Security
  • Factorization-Based Fail-Stop Signatures Revisited
  • A Qualitative Evaluation of Security Patterns
  • Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases
  • Volatile Memory Computer Forensics to Detect Kernel Level Compromise
  • A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet
  • Hydan: Hiding Information in Program Binaries