Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13--16, 2001. Proceedings (Q5951862)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13--16, 2001. Proceedings |
scientific article; zbMATH DE number 1687335
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13--16, 2001. Proceedings |
scientific article; zbMATH DE number 1687335 |
Statements
Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13--16, 2001. Proceedings (English)
0 references
8 January 2002
0 references
The articles of mathematical interest will be reviewed individually. The preceding conference (2nd, 1999) has been reviewed (see Zbl 0931.00051). Indexed articles: \textit{Schnorr, Claus Peter}, Security of blind discrete log signatures against interactive attacks, 1-12 [Zbl 1050.94532] \textit{Liu, Dongxi; Li, Xiaoyong; Bai, Yingcai}, An intelligent intruder model for security protocol analysis, 13-22 [Zbl 1050.94528] \textit{Gupta, Kishan Chand; Maitra, Subhamoy}, Primitive polynomials over GF(2) -- a cryptologic approach, 23-34 [Zbl 1050.94524] \textit{Yang, Bo; Zhu, Shixiong; Wang, Yumin}, Unconditionally-secure oblivious transfer, 35-41 [Zbl 1050.94537] \textit{Chang, Chin-Chen; Lin, Iuon-Chang}, Cryptanalysis of the improved user efficient blind signatures, 42-46 [Zbl 1050.94519] \textit{Chang, Chin-Chen; Hwang, Kuo-Feng}, Towards the forgery of a group signature without knowing the group center's secret, 47-51 [Zbl 1050.94518] \textit{Bo, Xiaochen; Shen, Lincheng; Chang, Wensen}, Evaluation of the image degradation for a typical watermarking algorithm in the block-DCT domain, 52-61 [Zbl 1050.94517] \textit{Aoki, Kazumaro; Hoshino, Fumitaka; Kobayashi, Tetsutaro}, A cyclic window algorithm for ECC defined over extension fields, 62-73 [Zbl 1050.94516] \textit{Zhang, Fangguo; Zhang, Futai; Wang, Yumin}, Fast scalar multiplication on the Jacobian of a family of hyperelliptic curves, 74-83 [Zbl 1050.94541] \textit{Ye, Dingfeng; Yang, Junhui; Dai, Zongduo; Ou, Haiwen}, Attacks on two digital signature schemes based on error correcting codes, 84-89 [Zbl 1050.94538] \textit{Matsuura, Kanta}, A derivative of digital objects and estimation of default risks in electronic commerce, 90-94 [Zbl 1050.94530] \textit{Shim, Young-Chul}, A new approach for secure multicast routing in a large scale network, 95-106 [Zbl 1050.68559] \textit{Kim, Hee-Wan; Rhee, Hae-Kyung; Chung, Tai M.; Eom, Young Ik; Kim, Ung-Mo}, A transaction length-sensitive protocol based on altruistic locking for multilevel secure database systems, 107-118 [Zbl 1050.68546] \textit{Cho, Sungbaek; Ciechanowicz, Zbigniew}, Dealing with uncertainties in risk analysis using belief functions, 119-130 [Zbl 1050.68541] \textit{Hitchens, Michael; Varadharajan, Vijay}, RBAC for XML document stores, 131-143 [Zbl 1050.68544] \textit{Zhang, Xian-Mo; Pieprzyk, Josef}, Cheating immune secret sharing, 144-149 [Zbl 1050.94543] \textit{Samid, Gideon}, Encryption sticks (Randomats), 150-154 [Zbl 1050.68558] \textit{Song, Zhimin; Qing, Sihan}, Applying NCP logic to the analysis of SSL 3.0, 155-166 [Zbl 1050.68560] \textit{Herwono, Ian; Liebhardt, Ingo}, Performance of WTLS and its impact on an m-commerce transaction, 167-171 [Zbl 1050.68543] \textit{Ribeiro, Carlos; Zúquete, André; Ferreira, Paulo}, Enforcing obligation with security monitors, 172-176 [Zbl 1050.68557] \textit{Ning, Peng; Yin, Yiqun Lisa}, Efficient software implementation for finite field multiplication in normal basis, 177-188 [Zbl 1050.94531] \textit{Zhou, Jianying; Tan, Chunfu}, Playing lottery on the internet, 189-201 [Zbl 1050.68565] \textit{Bao, Feng; Deng, Robert}, Privacy protection for transactions of digital goods, 202-213 [Zbl 1050.68537] \textit{Xu, Jie-lü; Xu, Han-liang; Wang, Yan; Lü, Shu-Wang}, Equivalent characterizations and applications of multi-output correlation-immune Boolean functions, 214-220 [Zbl 1050.94536] \textit{Wang, Guilin; Qing, Sihan; Wang, Mingsheng; Zhou, Zhanfei}, Threshold undeniable RSA signature scheme, 221-232 [Zbl 1050.94534] \textit{Hwang, Min-Shiang; Lee, Cheng-Chi; Tang, Yuan-Liang}, Two simple batch verifying multiple digital signatures, 233-237 [Zbl 1050.94526] \textit{He, Yeping; Qing, Sihan}, Square attack on reduced Camellia cipher, 238-245 [Zbl 1050.94525] \textit{You, Lin; Yang, Yi Xian; Zhang, Chun Qi}, Generalization of elliptic curve digital signature schemes, 246-250 [Zbl 1050.94539] \textit{Crispo, Bruno; Ruffo, Giancarlo}, Reasoning about accountability within delegation, 251-260 [Zbl 1050.94520] \textit{Pan, Gang; Wu, Yijun; Wu, Zhaohui}, A novel data hiding method for two-color images, 261-270 [Zbl 1050.68552] \textit{Lee, C.-H.; Deng, X.; Zhu, H.}, An identification scheme provably secure against reset attack, 271-279 [Zbl 1050.94527] \textit{Kunnari, Sanna}, Estimating the scalability of the internet key exchange, 280-291 [Zbl 1050.68548] \textit{Kuninobu, Shigeta; Takata, Yoshiaki; Seki, Hiroyuki; Inoue, Katsuro}, An efficient information flow analysis of recursive programs based on a lattice model of security classes, 292-303 [Zbl 1050.68547] \textit{Ye, Baoqing}, Defeating denial-of-service attacks on the internet, 304-315 [Zbl 1050.68562] \textit{Zhang, Dianlong; Lukhaub, Harald; Zorn, Werner}, A role-based access control model and implementation for data-centric enterprise applications, 316-327 [Zbl 1050.68564] \textit{Permpoontanalarp, Yongyuth; Rujimethabhas, Chaiwat}, A unified methodology for verification and synthesis of firewall configurations, 328-339 [Zbl 1050.68556] \textit{Chen, Yan; Bargteil, Adam; Bindel, David; Katz, Randy H.; Kubiatowicz, John}, Quantifying network denial of service: A location service case study, 340-351 [Zbl 1050.68539] \textit{González Nieto, Juan Manuel; Boyd, Colin; Dawson, Ed}, A public key cryptosystem based on the subgroup membership problem, 352-363 [Zbl 1050.94522] \textit{Hong, Ki-Yoong; Kim, Chul}, On a network security model for the secure information flow on multilevel secure network, 364-370 [Zbl 1050.68545] \textit{Luo, Wenjian; Cao, Xianbin; Wang, Xufa}, NIDS research based on artificial immunology, 371-375 [Zbl 1050.68551] \textit{Cánovas, Oscar; Gómez, Antonio F.}, AMBAR protocol: Access management based on authorization reduction, 376-380 [Zbl 1050.68538] \textit{Zou, Xukai; Ramamurthy, Byrav; Magliveras, Spyros S.}, Chinese remainder theorem based hierarchical access control for secure group communication, 381-385 [Zbl 1050.68566] \textit{Wang, Yan; Tan, Kian-Lee}, Dispatching mobile agents with secure routes in parallel, 386-397 [Zbl 1050.68561] \textit{Chen, Yu; Fang, Qian; Du, Zhihui; Huang, Zhenchun; Li, Sanli}, TH-SMS: Security management system in advanced computational infrastructure, 398-407 [Zbl 1050.68540] \textit{Lang, Ulrich; Gollmann, Dieter; Schreiner, Rudolf}, Cryptography and middleware security, 408-418 [Zbl 1050.68549] \textit{Zeng, Kencheng; Yang, Chung-Huang; Rao, T. R. N.}, Cryptanalysis of the Hwang-Rao secret error-correcting code schemes, 419-428 [Zbl 1050.94540] \textit{Disson, Eric; Boulanger, Danielle; Dubois, Gilles}, A role-based model for access control in database federations, 429-440 [Zbl 1050.68542] \textit{Li, Hongpei; Chang, Lianli; Wang, Xinmei}, A useful intrusion detection system prototype to monitor multi-processes based on system calls, 441-450 [Zbl 1050.68550] \textit{Park, Hee-Un; Lee, Im-Yeong}, A digital nominative proxy signature scheme for mobile communication, 451-455 [Zbl 1050.68553] \textit{Yi, Mi Ra; Cho, Tae Ho}, Hierarchical simulation model with animation for large network security, 456-460 [Zbl 1050.68563] \textit{Maitland, Greg; Boyd, Colin}, Fair electronic cash based on a group signature scheme, 461-465 [Zbl 1050.94529] \textit{Wu, Chuan-Kun; Varadharajan, Vijay}, Fair exchange of digital signatures with offline trusted third party, 466-470 [Zbl 1050.94535] \textit{Park, Jong Sou; Lee, Jang-Se; Kim, Hwan Kuk; Jeong, Jeong-Rye; Yeom, Dong-Bok; Chi, Sung-Do}, SECUSIM: A tool for the cyber-attack simulation, 471-475 [Zbl 1050.68555] \textit{Li, Yifa}, A new semantics of authentication logic, 476-482 [Zbl 1050.94542] \textit{Park, Ji Hwan; Jeong, Sook Ee; Kim, Chang Soo}, Robust and fragile watermarking techniques for documents using bi-directional diagonal profiles, 483-494 [Zbl 1050.68554] \textit{Gram, Seenil}, Redundancy, obscurity, self-containment \& independence, 495-501 [Zbl 1050.94523]
0 references
Xian (China)
0 references
Proceedings
0 references
Conference
0 references
ICICS 2001
0 references
Information security
0 references
Communications security
0 references
0 references
0.9341549
0 references
0.92719644
0 references
0.92137414
0 references
0 references
0.9155038
0 references
0.9154738
0 references
0.9114602
0 references
0 references