Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27--29, 2004. Proceedings. (Q1779870)

From MaRDI portal





scientific article; zbMATH DE number 2173660
Language Label Description Also known as
default for all languages
No label defined
    English
    Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27--29, 2004. Proceedings.
    scientific article; zbMATH DE number 2173660

      Statements

      Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27--29, 2004. Proceedings. (English)
      0 references
      2 June 2005
      0 references
      The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1024.00061). Indexed articles: \textit{Abdalla, Michel; Warinschi, Bogdan}, On the minimal assumptions of group signature schemes, 1-13 [Zbl 1109.68438] \textit{Susilo, Willy; Mu, Yi; Zhang, Fangguo}, Perfect concurrent signature schemes, 14-26 [Zbl 1109.68487] \textit{Herranz, Javier; Sáez, Germán}, New identity-based ring signature schemes, 27-39 [Zbl 1109.68460] \textit{Zhou, Jianying}, On the security of a multi-party certified email protocol, 40-52 [Zbl 1109.68495] \textit{Nikov, Ventzislav; Nikova, Svetla; Preneel, Bart}, Robust metering schemes for general access structures, 53-65 [Zbl 1109.68482] \textit{Herrmann, Klaus; Jaeger, Michael A.}, PayFlux -- secure electronic payment in mobile ad hoc networks, 66-78 [Zbl 1109.68461] \textit{Li, Tieyan; Wu, Yongdong; Ma, Di; Zhu, Huafei; Deng, Robert H.}, Flexible verification of MPEG-4 stream in peer-to-peer CDN, 79-91 [Zbl 1109.68473] \textit{Dutta, Ratna; Barua, Rana; Sarkar, Palash}, Provably secure authenticated tree based group key agreement, 92-104 [Zbl 1109.94344] \textit{Komano, Yuichi; Ohta, Kazuo}, Taxonomic consideration to OAEP variants and their security, 105-117 [Zbl 1109.68467] \textit{Schmidt-Samoa, Katja}, Factorization-based fail-stop signatures revisited, 118-131 [Zbl 1109.68485] \textit{Halkidis, Spyros T.; Chatzigeorgiou, Alexander; Stephanides, George}, A qualitative evaluation of security patterns, 132-144 [Zbl 1109.68457] \textit{Ishihara, Yasunori; Shimakawa, Yumi; Fujiwara, Toru}, Type inferability and decidability of the security problem against inference attacks on object-oriented databases, 145-157 [Zbl 1109.68463] \textit{Ring, Sandra; Cole, Eric}, Volatile memory computer forensics to detect kernel level compromise, 158-170 [Zbl 1109.68484] \textit{Moodahi, Ilanit; Gudes, Ehud; Lavee, Oz; Meisels, Amnon}, A secure workflow model based on distributed constrained role and task assignment for the internet, 171-186 [Zbl 1109.68341] \textit{El-Khalil, Rakan; Keromytis, Angelos D.}, Hydan: Hiding information in program binaries, 187-199 [Zbl 1109.68449] \textit{Hebbes, Luke; Lenaghan, Andrew}, A semi-fragile steganographic digital signature for images, 200-210 [Zbl 1109.68459] \textit{Fernandez, Marcel; Soriano, Miguel}, Identification of traitors using a trellis, 211-222 [Zbl 1109.68450] \textit{Garcia, Joaquin; Autrel, Fabien; Borrell, Joan; Castillo, Sergio; Cuppens, Frederic; Navarro, Guillermo}, Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation, 223-235 [Zbl 1109.68452] \textit{Lee, Hyung-Woo; Yun, Sung-Hyun; Kwon, Taekyoung; Kim, Jae-Sung; Park, Hee-Un; Oh, Nam-Ho}, Reflector attack traceback system with pushback based iTrace mechanism, 236-248 [Zbl 1109.68472] \textit{Lanotte, Ruggero; Maggiolo-Schettini, Andrea; Tini, Simone; Troina, Angelo; Tronci, Enrico}, Automatic covert channel analysis of a multilevel secure component, 249-261 [Zbl 1109.68470] \textit{Lynch, Christopher; Meadows, Catherine}, Sound approximations to Diffie-Hellman using rewrite rules, 262-277 [Zbl 1109.68475] \textit{Kargl, Anton; Wiesend, Götz}, On randomized addition-subtraction chains to counteract differential power attacks, 278-290 [Zbl 1109.68466] \textit{Sim, Sang Gyoo; Park, Dong Jin; Lee, Pil Joong}, New power analysis on the Ha-Moon algorithm and the MIST algorithm, 291-304 [Zbl 1109.94351] \textit{Han, Dong-Guk; Izu, Tetsuya; Lim, Jongin; Sakurai, Kouichi}, Modified power-analysis attacks on XTR and an efficient countermeasure, 305-317 [Zbl 1109.94346] \textit{Mazhelis, Oleksiy; Puuronen, Seppo; Veijalainen, Jari}, Modelling dependencies between classifiers in mobile masquerader detection, 318-330 [Zbl 1109.68476] \textit{Jung, Souhwan; Zhao, Fan; Wu, S. Felix; Kim, HyunGon}, Threat analysis on NEtwork MObility (NEMO), 331-342 [Zbl 1109.68465] \textit{Giansiracusa, Michelangelo; Russell, Selwyn; Clark, Andrew; Roth, Volker}, Macro-level attention to mobile agent security: Introducing the mobile agent secure hub infrastructure concept, 343-357 [Zbl 1109.68454] \textit{Wan, Tao; Kranakis, Evangelos; van Oorschot, Paul C.}, Securing the destination-sequenced distance vector routing protocol (S-DSDV), 358-374 [Zbl 1109.68488] \textit{Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki}, Secret-public storage trade-off for broadcast encryption key management, 375-387 [Zbl 1109.68478] \textit{Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Bao, Feng}, Security analysis of the generalized self-shrinking generator, 388-400 [Zbl 1109.94354] \textit{Yang, Bo-Yin; Chen, Jiun-Ming; Courtois, Nicolas T.}, On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis, 401-413 [Zbl 1109.94353] \textit{Monnerat, Jean; Vaudenay, Serge}, On some weak extensions of AES and BES, 414-426 [Zbl 1109.94349] \textit{Petrović, Slobodan; Fúster-Sabater, Amparo}, Clock control sequence reconstruction in the ciphertext only attack scenario, 427-439 [Zbl 1109.94350] \textit{Ciet, Mathieu; Giraud, Christophe}, Transient fault induction attacks on XTR, 440-451 [Zbl 1109.68447] \textit{Lin, Hsi-Chung; Yen, Sung-Ming; Chen, Guan-Ting}, Adaptive-CCA on OpenPGP revisited, 452-464 [Zbl 1109.68474] \textit{González-Deleito, Nicolás; Markowitch, Olivier; Dall'Olio, Emmanuel}, A new key-insulated signature scheme, 465-479 [Zbl 1109.94345] \textit{Chow, Sherman S. M.; Hui, Lucas C. K.; Yiu, Siu Ming; Chow, K. P.}, Secure hierarchical identity based signature and its application, 480-494 [Zbl 1109.68446] \textit{Laguillaumie, Fabien; Vergnaud, Damien}, Multi-designated verifiers signatures, 495-507 [Zbl 1109.68469] \textit{Ma, Di; Deng, Robert H.; Wu, Yongdong; Li, Tieyan}, Dynamic access control for multi-privileged group communications, 508-519 [Zbl 1109.94347] \textit{Hong, Kihun; Jung, Souhwan}, An efficient authentication scheme using recovery information in signature, 520-531 [Zbl 1109.68462] \textit{Davis, Darren; Monrose, Fabian; Reiter, Michael K.}, Time-scoped searching of encrypted audit logs, 532-545 [Zbl 1109.68448] \textit{Abie, Habtamu; Spilling, Pål; Foyn, Bent}, Rights-carrying and self-enforcing information objects for information distribution systems, 546-561 [Zbl 1109.68439]
      0 references

      Identifiers

      0 references
      0 references
      0 references
      0 references
      0 references
      0 references
      0 references
      0 references
      0 references