Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27--29, 2004. Proceedings (Q1763063)

From MaRDI portal
!
WARNING

This is the item page for this Wikibase entity, intended for internal use and editing purposes.

scientific article; zbMATH DE number 2135264
Language Label Description Also known as
default for all languages
No label defined
    English
    Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27--29, 2004. Proceedings
    scientific article; zbMATH DE number 2135264

      Statements

      Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27--29, 2004. Proceedings (English)
      0 references
      21 February 2005
      0 references
      The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1028.00038). Indexed articles: \textit{Kwon, Taekyoung}, Practical authenticated key agreement using passwords, 1-12 [Zbl 1109.68468] \textit{Zhang, Muxiang}, Further analysis of password authenticated key exchange protocol based on RSA for imbalanced wireless networks, 13-24 [Zbl 1109.68494] \textit{Wang, Pan; Ning, Peng; Reeves, Douglas S.}, Storage-efficient stateless group key revocation, 25-38 [Zbl 1109.68491] \textit{Backes, Michael; Pfitzmann, Birgit; Waidner, Michael}, Low-level ideal signatures and general integrity idealization, 39-51 [Zbl 1109.68442] \textit{Cathalo, Julien; Libert, Benoît; Quisquater, Jean-Jacques}, Cryptanalysis of a verifiably committed signature scheme based on GPS and RSA, 52-60 [Zbl 1109.68444] \textit{Backes, Michael; Hofheinz, Dennis}, How to break and repair a universally composable signature functionality, 61-72 [Zbl 1109.68441] \textit{Gentry, Craig; Ramzan, Zulfikar}, RSA accumulator based broadcast encryption, 73-86 [Zbl 1109.68453] \textit{Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo}, Chameleon hashing without key exposure, 87-98 [Zbl 1109.68445] \textit{Takagi, Tsuyoshi; Yen, Sung-Ming; Wu, Bo-Ching}, Radix-\(r\) non-adjacent form., 99-110 [Zbl 1109.94352] \textit{Phan, Raphael C.-W.; Handschuh, Helena}, On related-key and collision attacks: The case for the IBM 4758 cryptoprocessor, 111-122 [Zbl 1109.68483] \textit{Wang, Guilin; Deng, Robert H.; Kwak, DongJin; Moon, SangJae}, Security analysis of two signcryption schemes, 123-133 [Zbl 1109.68489] \textit{Adams, Carlisle; Kramer, Guenther; Mister, Serge; Zuccherato, Robert}, On the security of key derivation functions, 134-145 [Zbl 1109.68440] \textit{Wang, Hai; Liu, Peng; Li, Lunqun}, Evaluating the impact of intrusion detection deficiencies on the cost-effectiveness of attack recovery, 146-157 [Zbl 1109.68490] \textit{Meier, Michael}, A model for the semantics of attack signatures in misuse detection systems, 158-169 [Zbl 1109.68477] \textit{Foster, Mark; Wilson, Joseph N.; Chen, Shigang}, Using greedy Hamiltonian call paths to detect stack smashing attacks, 183-194 [Zbl 1109.68451] \textit{Bertino, Elisa; Leggieri, Teodoro; Terzi, Evimaria}, Securing DBMS: Characterizing and detecting query floods, 195-206 [Zbl 1109.68443] \textit{Guelev, Dimitar P.; Ryan, Mark; Schobbens, Pierre Yves}, Model-checking access control policies, 219-230 [Zbl 1109.68456] \textit{Nali, D.; Adams, C.; Miri, A.}, Using mediated identity-based cryptography to support role-based access control, 245-256 [Zbl 1109.68480] \textit{Le, Zhengyi; Ouyang, Yi; Ford, James; Makedon, Fillia}, A hierarchical key-insulated signature scheme in the CA trust model, 280-291 [Zbl 1109.68471] \textit{Jiang, Qinglin; Reeves, Douglas S.; Ning, Peng}, Certificate recommendations to improve the robustness of web of trust, 292-303 [Zbl 1109.68464] \textit{Xu, Ke; Tate, Stephen R.}, Universally composable secure mobile agent computation, 304-317 [Zbl 1109.68493] \textit{Wu, Qianhong; Chen, Xiaofeng; Wang, Changjie; Wang, Yumin}, Shared-key signature and its application to anonymous authentication in ad hoc group, 330-341 [Zbl 1109.68492] \textit{Gomułkiewicz, Marcin; Klonowski, Marek; Kutyłowski, Mirosław}, Provable unlinkability against traffic analysis already after \(\mathcal {O}(\log (n))\) steps!, 354-366 [Zbl 1109.68455] \textit{Nakanishi, Toru; Shiota, Mitsuaki; Sugiyama, Yuji}, An efficient online electronic cash with unlinkable exact payments, 367-378 [Zbl 1109.68479]
      0 references

      Identifiers

      0 references
      0 references
      0 references
      0 references
      0 references
      0 references