Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings

Front Cover
Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang
Springer Science & Business Media, Nov 30, 2005 - Business & Economics - 492 pages
The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi’an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o?er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

An Evenhanded Certified Email System for Contract Signing
1
Efficient IDBased Optimistic Fair Exchange with Provable Security
14
Design and Analysis of a Fair Nonrepudiation Protocol
27
Generic Optimistic and Efficient Schemes for Fair Certified Email Delivery
40
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security
53
On Delegatability of Four Designated Verifier Signatures
61
A Partially Sanitizable Signature Scheme
72
Ciphertext Comparison a New Solution to the Millionaire Problem
84
Network Vulnerability Analysis Through Vulnerability TakeGrant Model VTG
256
A Practical Approach to Encrypting Multirecipient Emails
269
Secure Multicast Using Proxy Encryption
280
Efficient and Noninteractive TimedRelease Encryption
291
Security Properties of Two Authenticated Conference Key Agreement Protocols
304
Anonymity
315
Enhanced IDBased Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment
323
Enforce Mandatory Access Control Policy on XML Documents
336

Private Itemset Support Counting
97
Visual Cryptographic Protocols Using the Trusted Initializer
112
Admissible Interference by Typing for Cryptographic Protocols
123
On the Security Bounds of CMC EME EME and EME Modes of Operation
136
On the Security of Encryption Modes of MD4 MD5 and HAVAL
147
Cryptanalysis of PASS II and MiniPass
159
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves
169
Asymmetric Concurrent Signatures
181
Generic Construction of IdentityBased Perfect Concurrent Signatures
194
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor OneWay Permutation Domains
207
Session Table Architecture for Defending SYN Flood Attack
220
A BehaviorBased Ingress RateLimiting Mechanism Against DoSDDoS Attacks
231
Port Scan Behavior Diagnosis by Clustering
243
Network Access Control for Mobile AdHoc Networks
350
Remotely Keyed Cryptographics Secure Remote Display Access Using Mostly Untrusted Hardware
363
Authenticating Query Results in Data Publishing
376
MultiSource Stream Authentication Framework in Case of Composite MPEG4 Stream
389
Batching SSLTLS Handshake Improved
402
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
414
Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio
427
Reversible Watermark with Large Capacity Using the Predictive Coding
441
Internet Attack Visualization on Parallel Coordinates
454
Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA
467
An Intrusion Prevention System for Database Security
481
Author Index
491
Copyright

Common terms and phrases