Information and Communications Security 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings

ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10–13 October 2003. Among the preceding conferences, ICICS’97 was held in B- jing, China, ICICS’99 in Sydney, Australia, ICICS 2001 in Xi’an, China, and ICICS...

Full description

Bibliographic Details
Other Authors: Perner, Petra (Editor), Gollmann, Dieter (Editor), Zhou, Jianying (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2003, 2003
Edition:1st ed. 2003
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine
  • UC-RBAC: A Usage Constrained Role-Based Access Control Model
  • (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography
  • An Optimized Multi-bits Blind Watermarking Scheme
  • A Compound Intrusion Detection Model
  • An Efficient Convertible Authenticated Encryption Scheme and Its Variant
  • Space-Economical Reassembly for Intrusion Detection System
  • A Functional Decomposition of Virus and Worm Programs
  • Research on the Collusion Estimation
  • Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains
  • Protocols for Malicious Host Revocation
  • A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code
  • A Novel Two-Level Trust Model for Grid
  • Practical t-out-n Oblivious Transfer and Its Applications
  • Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
  • ID-Based Distributed “Magic Ink” Signature from Pairings
  • A Simple Anonymous Fingerprinting Scheme Based on Blind Signature
  • Compact Conversion Schemes for the Probabilistic OW-PCA Primitives
  • A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems
  • A Novel Efficient Group Signature Scheme with Forward Security
  • Variations of Diffie-Hellman Problem
  • A Study on the CovertChannel Detection of TCP/IP Header Using Support Vector Machine
  • A Fast Square Root Computation Using the Frobenius Mapping
  • A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption
  • Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
  • On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST
  • A Policy Based Framework for Access Control
  • Trading-Off Type-Inference Memory Complexity against Communication
  • Security Remarks on a Group Signature Scheme with Member Deletion
  • An Efficient Known Plaintext Attack on FEA-M
  • An Efficient Public-Key Framework
  • ROCEM: Robust Certified E-mail System Based on Server-Supported Signature
  • Practical Service Charge for P2P Content Distribution
  • ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback
  • A Lattice Based General Blind Watermark Scheme
  • Role-Based Access Control and the Access Control Matrix
  • Broadcast Encryption Schemes Based on the Sectioned Key Tree