ICICS 2004, Volume 6

Front Cover
This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), ´ Spain,27–29 October 2004. The ?ve previous conferences were held in Beijing, Sydney, Xian, S- gapore and Huhehaote City, where we had an enthusiastic and well-attended event. The proceedings were released as volumes 1334, 1726, 2229, 2513 and 2836 of the LNCS series of Springer, respectively. During these last years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by offering you yet another successful meeting with a rich and interesting program. The responseto the Call for Paperswas overwhelming,245 papersubmissionswere received. Therefore, the paper selection process was very competitive and dif?cult – only 42 papers were accepted. The success of the conference depends on the quality of the program. Thus, we are indebted to our Program Committee members and the ext- nal refereesfor the great job they did. These proceedingscontainrevised versionsof the accepted papers.Revisions were not checked and the authorsbear full responsibilityfor the content of their papers.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

On the Minimal Assumptions of Group Signature Schemes
1
Perfect Concurrent Signature Schemes
14
New IdentityBased Ring Signature Schemes
27
On the Security of a Multiparty Certified Email Protocol
40
Robust Metering Schemes for General Access Structures
53
PAYFLUXSecure Electronic Payment in Mobile AdHoc Networks
66
Flexible Verification of MPEG4 Stream in PeertoPeer CDN
79
Provably Secure Authenticated Tree Based Group Key Agreement
92
New Power Analysis on the HaMoon Algorithm and the MIST Algorithm
291
Modified PowerAnalysis Attacks on XTR and an Efficient Countermeasure
305
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection
318
Threat Analysis on NEtwork MObility NEMO
331
Introducing the Mobile Agent Secure Hub Infrastructure Concept
343
Securing the DestinationSequenced Distance Vector Routing Protocol SDSDV
358
SecretPublic Storage TradeOff for Broadcast Encryption Key Management
375
Security Analysis of the Generalized Selfshrinking Generator
388

Taxonomic Consideration to OAEP Variants and Their Security
105
FactorizationBased FailStop Signatures Revisited
118
A Qualitative Evaluation of Security Patterns
132
Type Inferability and Decidability of the Security Problem Against Inference Attacks on ObjectOriented Databases
145
Volatile Memory Computer Forensics to Detect Kernel Level Compromise
158
A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet
171
Hiding Information in Program Binaries
187
A Semifragile Steganographic Digital Signature for Images
200
Identification of Traitors Using a Trellis
211
Decentralized PublishSubscribe System to Prevent Coordinated Attacks via Alert Correlation
223
Reflector Attack Traceback System with Pushback Based iTrace Mechanism
236
Automatic Covert Channel Analysis of a Multilevel Secure Component
249
Sound Approximations to DiffieHellman Using Rewrite Rules
262
On Randomized AdditionSubtraction Chains to Counteract Differential Power Attacks
278
On Asymptotic Security Estimates in XL and Gröbner BasesRelated Algebraic Cryptanalysis
401
On Some Weak Extensions of AES and BES
414
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario
427
Transient Fault Induction Attacks on XTR
440
AdaptiveCCA on OpenPGP Revisited
452
A New KeyInsulated Signature Scheme
465
Secure Hierarchical Identity Based Signature and Its Application
480
Multidesignated Verifiers Signatures
495
Dynamic Access Control for Multiprivileged Group Communications
508
An Efficient Authentication Scheme Using Recovery Information in Signature
520
TimeScoped Searching of Encrypted Audit Logs
532
RightsCarrying and Selfenforcing Information Objects for Information Distribution Systems
546
Author Index
562
Copyright

Other editions - View all

Common terms and phrases