Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9--12, 2002. Proceedings (Q1863980)

From MaRDI portal





scientific article; zbMATH DE number 1880697
Language Label Description Also known as
English
Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9--12, 2002. Proceedings
scientific article; zbMATH DE number 1880697

    Statements

    Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9--12, 2002. Proceedings (English)
    0 references
    12 March 2003
    0 references
    The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 0977.00049). Indexed articles: \textit{Cheng, Jeff S. L.; Wei, Victor K.}, Defenses against the truncation of computation results of free-roaming agents, 1-12 [Zbl 1023.68552] \textit{Jin, Hai; Xian, Feng; Han, Zongfen; Li, Shengli}, A distributed dynamic \(\mu\) Firewall architecture with mobile agents and KeyNote trust management system, 13-24 [Zbl 1023.68555] \textit{Pyo, Changwoo; Lee, Gyungho}, Encoding function pointers and memory arrangement checking against buffer overflow attack, 25-36 [Zbl 1023.68566] \textit{Kuznetsov, Vadim; Sandström, Helena; Simkin, Andrei}, An evaluation of different IP traceback approaches, 37-48 [Zbl 1023.68558] \textit{Ishihara, Yasunori; Ako, Shuichiro; Fujiwara, Toru}, Security against inference attacks on negative information in object-oriented databases, 49-60 [Zbl 1023.68554] \textit{Tzeng, Wen-Guey; Tzeng, Zhi-Jia}, Robust key-evolving public key encryption schemes, 61-72 [Zbl 1023.94538] \textit{Nakanishi, Toru; Tao, Masayuki; Sugiyama, Yuji}, A group signature scheme committing the group, 73-84 [Zbl 1023.94533] \textit{Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki}, Unconditionally secure key insulated cryptosystems: Models, bounds and constructions, 85-96 [Zbl 1023.68553] \textit{Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo}, Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption, 97-108 [Zbl 1023.94528] \textit{Naccache, David; Tchoulkine, Alexei; Tymen, Christophe; Trichina, Elena}, Reducing the memory complexity of type-inference algorithms, 109-121 [Zbl 1023.68563] \textit{Shim, Kyungah}, The risks of compromising secret information, 122-133 [Zbl 1023.94536] \textit{Byun, Jin Wook; Jeong, Ik Rae; Lee, Dong Hoon; Park, Chang-Seop}, Password-authenticated key exchange between clients with different passwords, 134-146 [Zbl 1023.94520] \textit{Peng, Kun; Boyd, Colin; Dawson, Ed; Viswanathan, Kapali}, Robust, privacy protecting and publicly verifiable sealed-bid auction, 147-159 [Zbl 1023.68565] \textit{Vaarala, Sami; Nuopponen, Antti; Virtanen, Teemupekka}, Attacking predictable IPsec ESP initialization vectors, 160-172 [Zbl 1023.68568] \textit{Watanabe, Hajime; Kitagawa, Takashi}, An ID coding scheme for fingerprinting, randomized \(c\)-secure CRT code, 173-183 [Zbl 1023.68569] \textit{Das, Tanmoy Kanti; Maitra, Subhamoy}, A robust block oriented watermarking scheme in spatial domain, 184-196 [Zbl 1023.94522] \textit{Matsushita, Tatsuyuki}, A flexibly revocable key-distribution scheme for efficient black-box tracing, 197-208 [Zbl 1023.94531] \textit{Kwon, Soonhak}, Low complexity bit serial systolic multipliers over GF(\(2^m\)) for three classes of finite fields, 209-216 [Zbl 1023.11501] \textit{Izu, Tetsuya; Takagi, Tsuyoshi}, Fast elliptic curve multiplications with SIMD operations, 217-230 [Zbl 1023.94526] \textit{Venkateswarlu, Ayineedi; Maitra, Subhamoy}, Further results on multiples of primitive polynomials and their products over GF\((2)\), 231-242 [Zbl 1023.94539] \textit{Zhang, Junqi; Varadharajan, Vijay; Mu, Yi}, A secure object sharing scheme for Java card, 243-251 [Zbl 1023.68571] \textit{Carey, Nathan; Clark, Andrew; Mohay, George}, IDS interoperability and correlation using IDMEF and commodity systems, 252-264 [Zbl 1023.68551] \textit{Lundin, Emilie; Kvarnström, Håkan; Jonsson, Erland}, A synthetic fraud data generation methodology, 265-277 [Zbl 1023.68561] \textit{Yee, Ka-Ping}, User interaction design for secure systems, 278-290 [Zbl 1023.68570] \textit{Molina, Jesus; Arbaugh, William}, Using independent auditors as intrusion detection systems, 291-302 [Zbl 1023.68562] \textit{Sen, Subhayan; Shaw, Chandrama; Chowdhuri, Dipanwita Roy; Ganguly, Niloy; Chaudhuri, P. Pal}, Cellular automata based cryptosystem (CAC), 303-314 [Zbl 1023.94535] \textit{Biryukov, Alex; Nakahara, Jorge jun.; Preneel, Bart; Vandewalle, Joos}, New weak-key classes of IDEA, 315-326 [Zbl 1023.94519] \textit{Furuya, Soichi; Sakurai, Kouichi}, Risks with raw-key masking -- the security evaluation of 2-key XCBC, 327-341 [Zbl 1023.94524] \textit{Filiol, Eric}, A new statistical testing for symmetric ciphers and hash functions, 342-353 [Zbl 1023.94523] \textit{Lam, Charles C. Y.; Gong, Guang; Vanstone, Scott A.}, Message authentication codes with error correcting capabilities, 354-366 [Zbl 1023.94529] \textit{Li, Shou-peng; Wu, Shi-zhong; Guo, Tao}, The consistency of an access control list, 367-373 [Zbl 1023.68559] \textit{Koh, Jong-Young; Yi, Mi-Ra; Cho, Tae-Ho; Kim, Hyung-Jong; Kim, Hong-Geun}, Knowledge-based modeling and simulation of network access control mechanisms representing security policies, 374-385 [Zbl 1023.68556] \textit{Kuninobu, Shigeta; Takata, Yoshiaki; Taguchi, Daigo; Nakae, Masayuki; Seki, Hiroyuki}, A specification language for distributed policy control, 386-398 [Zbl 1023.68557] \textit{López, Javier; Maña, Antonio; Pimentel, Ernesto; Troya, José M.; Yagüe, Mariemma I.}, Access control infrastructure for digital objects, 399-410 [Zbl 1023.68560] \textit{Chu, Cheng-Kang; Tzeng, Wen-Guey}, Distributed key generation as a component of an integrated protocol, 411-421 [Zbl 1023.94521] \textit{Pang, Xiaolin; Tan, Kian-Lee; Wang, Yan; Ren, Jian}, A secure agent-mediated payment protocol, 422-433 [Zbl 1023.68564] \textit{Kholosha, Alexander; van Tilborg, Henk C. A.}, Tensor transform of Boolean functions and related algebraic and probabilistic properties, 434-446 [Zbl 1023.94527] \textit{Wu, Hongjun}, Related-cipher attacks, 447-455 [Zbl 1023.94540] \textit{Lee, Changhoon; Hong, Deukjo; Lee, Sungjae; Lee, Sangjin; Yang, Hyungjin; Lim, Jongin}, A chosen plaintext linear attack on block cipher CIKS-1, 456-468 [Zbl 1023.94530] \textit{Pieprzyk, Josef; Zhang, Xiam-Mo}, Ideal threshold schemes from orthogonal arrays, 469-479 [Zbl 1023.94534] \textit{Miyaji, Atsuko; Nonaka, Masao}, Cryptanalysis of the reduced-round RC6, 480-494 [Zbl 1023.94532]
    0 references
    Information security
    0 references
    Communications security
    0 references
    ICICS 2002
    0 references
    Singapore (Singapore)
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references