Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27--29, 2004. Proceedings. (Q1779870)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27--29, 2004. Proceedings. |
scientific article; zbMATH DE number 2173660
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27--29, 2004. Proceedings. |
scientific article; zbMATH DE number 2173660 |
Statements
Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27--29, 2004. Proceedings. (English)
0 references
2 June 2005
0 references
The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1024.00061). Indexed articles: \textit{Abdalla, Michel; Warinschi, Bogdan}, On the minimal assumptions of group signature schemes, 1-13 [Zbl 1109.68438] \textit{Susilo, Willy; Mu, Yi; Zhang, Fangguo}, Perfect concurrent signature schemes, 14-26 [Zbl 1109.68487] \textit{Herranz, Javier; Sáez, Germán}, New identity-based ring signature schemes, 27-39 [Zbl 1109.68460] \textit{Zhou, Jianying}, On the security of a multi-party certified email protocol, 40-52 [Zbl 1109.68495] \textit{Nikov, Ventzislav; Nikova, Svetla; Preneel, Bart}, Robust metering schemes for general access structures, 53-65 [Zbl 1109.68482] \textit{Herrmann, Klaus; Jaeger, Michael A.}, PayFlux -- secure electronic payment in mobile ad hoc networks, 66-78 [Zbl 1109.68461] \textit{Li, Tieyan; Wu, Yongdong; Ma, Di; Zhu, Huafei; Deng, Robert H.}, Flexible verification of MPEG-4 stream in peer-to-peer CDN, 79-91 [Zbl 1109.68473] \textit{Dutta, Ratna; Barua, Rana; Sarkar, Palash}, Provably secure authenticated tree based group key agreement, 92-104 [Zbl 1109.94344] \textit{Komano, Yuichi; Ohta, Kazuo}, Taxonomic consideration to OAEP variants and their security, 105-117 [Zbl 1109.68467] \textit{Schmidt-Samoa, Katja}, Factorization-based fail-stop signatures revisited, 118-131 [Zbl 1109.68485] \textit{Halkidis, Spyros T.; Chatzigeorgiou, Alexander; Stephanides, George}, A qualitative evaluation of security patterns, 132-144 [Zbl 1109.68457] \textit{Ishihara, Yasunori; Shimakawa, Yumi; Fujiwara, Toru}, Type inferability and decidability of the security problem against inference attacks on object-oriented databases, 145-157 [Zbl 1109.68463] \textit{Ring, Sandra; Cole, Eric}, Volatile memory computer forensics to detect kernel level compromise, 158-170 [Zbl 1109.68484] \textit{Moodahi, Ilanit; Gudes, Ehud; Lavee, Oz; Meisels, Amnon}, A secure workflow model based on distributed constrained role and task assignment for the internet, 171-186 [Zbl 1109.68341] \textit{El-Khalil, Rakan; Keromytis, Angelos D.}, Hydan: Hiding information in program binaries, 187-199 [Zbl 1109.68449] \textit{Hebbes, Luke; Lenaghan, Andrew}, A semi-fragile steganographic digital signature for images, 200-210 [Zbl 1109.68459] \textit{Fernandez, Marcel; Soriano, Miguel}, Identification of traitors using a trellis, 211-222 [Zbl 1109.68450] \textit{Garcia, Joaquin; Autrel, Fabien; Borrell, Joan; Castillo, Sergio; Cuppens, Frederic; Navarro, Guillermo}, Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation, 223-235 [Zbl 1109.68452] \textit{Lee, Hyung-Woo; Yun, Sung-Hyun; Kwon, Taekyoung; Kim, Jae-Sung; Park, Hee-Un; Oh, Nam-Ho}, Reflector attack traceback system with pushback based iTrace mechanism, 236-248 [Zbl 1109.68472] \textit{Lanotte, Ruggero; Maggiolo-Schettini, Andrea; Tini, Simone; Troina, Angelo; Tronci, Enrico}, Automatic covert channel analysis of a multilevel secure component, 249-261 [Zbl 1109.68470] \textit{Lynch, Christopher; Meadows, Catherine}, Sound approximations to Diffie-Hellman using rewrite rules, 262-277 [Zbl 1109.68475] \textit{Kargl, Anton; Wiesend, Götz}, On randomized addition-subtraction chains to counteract differential power attacks, 278-290 [Zbl 1109.68466] \textit{Sim, Sang Gyoo; Park, Dong Jin; Lee, Pil Joong}, New power analysis on the Ha-Moon algorithm and the MIST algorithm, 291-304 [Zbl 1109.94351] \textit{Han, Dong-Guk; Izu, Tetsuya; Lim, Jongin; Sakurai, Kouichi}, Modified power-analysis attacks on XTR and an efficient countermeasure, 305-317 [Zbl 1109.94346] \textit{Mazhelis, Oleksiy; Puuronen, Seppo; Veijalainen, Jari}, Modelling dependencies between classifiers in mobile masquerader detection, 318-330 [Zbl 1109.68476] \textit{Jung, Souhwan; Zhao, Fan; Wu, S. Felix; Kim, HyunGon}, Threat analysis on NEtwork MObility (NEMO), 331-342 [Zbl 1109.68465] \textit{Giansiracusa, Michelangelo; Russell, Selwyn; Clark, Andrew; Roth, Volker}, Macro-level attention to mobile agent security: Introducing the mobile agent secure hub infrastructure concept, 343-357 [Zbl 1109.68454] \textit{Wan, Tao; Kranakis, Evangelos; van Oorschot, Paul C.}, Securing the destination-sequenced distance vector routing protocol (S-DSDV), 358-374 [Zbl 1109.68488] \textit{Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki}, Secret-public storage trade-off for broadcast encryption key management, 375-387 [Zbl 1109.68478] \textit{Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Bao, Feng}, Security analysis of the generalized self-shrinking generator, 388-400 [Zbl 1109.94354] \textit{Yang, Bo-Yin; Chen, Jiun-Ming; Courtois, Nicolas T.}, On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis, 401-413 [Zbl 1109.94353] \textit{Monnerat, Jean; Vaudenay, Serge}, On some weak extensions of AES and BES, 414-426 [Zbl 1109.94349] \textit{Petrović, Slobodan; Fúster-Sabater, Amparo}, Clock control sequence reconstruction in the ciphertext only attack scenario, 427-439 [Zbl 1109.94350] \textit{Ciet, Mathieu; Giraud, Christophe}, Transient fault induction attacks on XTR, 440-451 [Zbl 1109.68447] \textit{Lin, Hsi-Chung; Yen, Sung-Ming; Chen, Guan-Ting}, Adaptive-CCA on OpenPGP revisited, 452-464 [Zbl 1109.68474] \textit{González-Deleito, Nicolás; Markowitch, Olivier; Dall'Olio, Emmanuel}, A new key-insulated signature scheme, 465-479 [Zbl 1109.94345] \textit{Chow, Sherman S. M.; Hui, Lucas C. K.; Yiu, Siu Ming; Chow, K. P.}, Secure hierarchical identity based signature and its application, 480-494 [Zbl 1109.68446] \textit{Laguillaumie, Fabien; Vergnaud, Damien}, Multi-designated verifiers signatures, 495-507 [Zbl 1109.68469] \textit{Ma, Di; Deng, Robert H.; Wu, Yongdong; Li, Tieyan}, Dynamic access control for multi-privileged group communications, 508-519 [Zbl 1109.94347] \textit{Hong, Kihun; Jung, Souhwan}, An efficient authentication scheme using recovery information in signature, 520-531 [Zbl 1109.68462] \textit{Davis, Darren; Monrose, Fabian; Reiter, Michael K.}, Time-scoped searching of encrypted audit logs, 532-545 [Zbl 1109.68448] \textit{Abie, Habtamu; Spilling, Pål; Foyn, Bent}, Rights-carrying and self-enforcing information objects for information distribution systems, 546-561 [Zbl 1109.68439]
0 references