My Account Log in

1 option

Information and Communications Security : 11th International Conference, ICICS 2009 / edited by Sihan Qing, Chris J. Mitchell, Guilin Wang.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Qing, Sihan, editor.
Mitchell, Chris J., editor.
Wang, Guilin, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 5927.
Security and Cryptology ; 5927
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Computer programming.
Data structures (Computer science).
Coding theory.
Information theory.
Computer security.
Cryptology.
Computer Communication Networks.
Programming Techniques.
Data Structures and Information Theory.
Coding and Information Theory.
Systems and Data Security.
Local Subjects:
Cryptology.
Computer Communication Networks.
Programming Techniques.
Data Structures and Information Theory.
Coding and Information Theory.
Systems and Data Security.
Physical Description:
1 online resource (XIV, 504 pages).
Edition:
First edition 2009.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Beijing, China, in December 2009. The 37 revised full papers presented together with one invited paper were carefully reviewed and selected from 162 submissions. The papers are organized in topical sections on cryptanalysis, algorithms and implemantations, public key cryptography, security applications, software security, system security, network security, database security, trust management, and applied cryptography.
Contents:
Invited Talks
How to Steal a Botnet and What Can Happen When You Do
A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing
Cryptanalysis
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
Algorithms and Implementations
The rakaposhi Stream Cipher
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems
Public Key Cryptography
Online/Offline Ring Signature Scheme
Policy-Controlled Signatures
Public Key Encryption without Random Oracle Made Truly Practical
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
Security Applications
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains
Biometric-Based Non-transferable Anonymous Credentials
Software Security
Secure Remote Execution of Sequential Computations
Architecture- and OS-Independent Binary-Level Dynamic Test Generation
System Security
Measuring Information Flow in Reactive Processes
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
Denial-of-Service Attacks on Host-Based Generic Unpackers
Network Security
Predictive Pattern Matching for Scalable Network Intrusion Detection
Deterministic Finite Automata Characterization for Memory-Based Pattern Matching
A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold
User-Assisted Host-Based Detection of Outbound Malware Traffic
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
Short Papers I
Using the (Open) Solaris Service Management Facility as a Building Block for System Security
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]
Database Security
Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining
GUC-Secure Join Operator in Distributed Relational Database
Trust Management
TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics
Bring Efficient Connotation Expressible Policies to Trust Management
A User Trust-Based Collaborative Filtering Recommendation Algorithm
Applied Cryptography
Fingerprinting Attack on the Tor Anonymity System
Proactive Verifiable Linear Integer Secret Sharing Scheme
A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach
Digital Audio Watermarking Technique Using Pseudo-Zernike Moments
Short Papers II
An Image Sanitizing Scheme Using Digital Watermarking
Adaptive and Composable Oblivious Transfer Protocols (Short Paper)
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Other Format:
Printed edition:
ISBN:
978-3-642-11145-7
9783642111457
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account