My Account Log in

1 option

Information and Communications Security : 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings / edited by Hideki Imai, Guilin Wang.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Imai, Hideki, editor.
Wang, Guilin, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 4861.
Security and Cryptology ; 4861
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Computer security.
Management information systems.
Computer science.
Computers and civilization.
Algorithms.
Cryptology.
Computer Communication Networks.
Systems and Data Security.
Management of Computing and Information Systems.
Computers and Society.
Algorithm Analysis and Problem Complexity.
Local Subjects:
Cryptology.
Computer Communication Networks.
Systems and Data Security.
Management of Computing and Information Systems.
Computers and Society.
Algorithm Analysis and Problem Complexity.
Physical Description:
1 online resource (XIV, 514 pages).
Edition:
First edition 2007.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
System Details:
text file PDF
Contents:
Authentication and Key Exchange
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
New Construction of Group Secret Handshakes Based on Pairings
nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
An Efficient Password-Only Two-Server Authenticated Key Exchange System
Digital Signatures
Formal Definition and Construction of Nominative Signature
Short Group Signature Without Random Oracles
(Convertible) Undeniable Signatures Without Random Oracles
Applications
A New Dynamic Accumulator for Batch Updates
Preventing Unofficial Information Propagation
A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction
Privacy Protection on Multiple Sensitive Attributes
Watermarking
Audio Watermarking Algorithm Based on Centroid and Statistical Features
A Semi-blind Watermarking Based on Discrete Wavelet Transform
Fast Implementations
On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme
High Speed Modular Divider Based on GCD Algorithm
MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set
Compact and Secure Design of Masked AES S-Box
Applied Cryptography
Boudot's Range-Bounded Commitment Scheme Revisited
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions
Secure Multiparty Computation of DNF
Cryptanalysis
Square Like Attack on Camellia
Differential Fault Analysis on CLEFIA
Extending FORK-256 Attack to the Full Hash Function
Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard
Formal Analysis
A Framework for Game-Based Security Proofs
What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security
Modeling Agreement Problems in the Universal Composability Framework
System Security I
A System Architecture for History-Based Access Control for XML Documents
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies
System Security II
A Novel Approach for Untrusted Code Execution
Detection and Diagnosis of Control Interception
BIOS Security Analysis and a Kind of Trusted BIOS
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
Network Security
DDoS Attack Detection Algorithms Based on Entropy Computing
Firewall for Dynamic IP Address in Mobile IPv6
Application of the PageRank Algorithm to Alarm Graphs
Drive-By Pharming.
Other Format:
Printed edition:
ISBN:
978-3-540-77048-0
9783540770480
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account