Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, Volume 5

Front Cover
ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10–13 October 2003. Among the preceding conferences, ICICS’97 was held in B- jing, China, ICICS’99 in Sydney, Australia, ICICS 2001 in Xi’an, China, and ICICS 2002,in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conferences has been to o?er the attendees the - portunity to discuss the state-of-the-art technology in theoretical and practical aspects of information and communications security. The response to the Call forPaperswassurprising.WhenwewerepreparingtheconferencebetweenApril and May, China, including the conference venue, Huhehaote City, was ?ghting against SARS. Despite this 176 papers were submitted to the conference from 22 countries and regions, and after a competitive selection process, 37 papers from 14 countries and regions were accepted to appear in the proceedings and be presented at ICICS 2003. We would like to take this opportunity to thank all those who submitted papers to ICICS 2003 for their valued contribution to the conference.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

A Fast Square Root Computation Using the Frobenius Mapping
1
A ForwardSecure Blind Signature Scheme Based on the Strong RSA Assumption
11
Secure Route Structures for the Fast Dispatch of LargeScale Mobile Agents
22
On the RSCode Construction of Ring Signature Schemes and a Threshold Setting of RST
34
A Policy Based Framework for Access Control
47
TradingOff TypeInference Memory Complexity against Communication
60
Security Remarks on a Group Signature Scheme with Member Deletion
72
An Efficient Known Plaintext Attack on FEAM
84
Practical toutn Oblivious Transfer and Its Applications
226
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
238
from Pairings
249
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature
260
Compact Conversion Schemes for the Probabilistic OWPCA Primitives
269
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems
280
A Novel Efficient Group Signature Scheme with Forward Security
292
Variations of DiffieHellman Problem
301

An Efficient PublicKey Framework
88
Robust Certified Email System Based on ServerSupported Signature
100
Practical Service Charge for P2P Content Distribution
112
ICMP Traceback with Cumulative Path an Efficient Solution for IP Traceback
124
A Lattice Based General Blind Watermark Scheme
136
RoleBased Access Control and the Access Control Matrix
145
Broadcast Encryption Schemes Based on the Sectioned Key Tree
158
Research on the Collusion Estimation
170
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains
179
Protocols for Malicious Host Revocation
191
A DWTBased Digital Video Watermarking Scheme with Error Correcting Code
202
A Novel TwoLevel Trust Model for Grid
214
A Study on the Covert Channel Detection of TCPIP Header Using Support Vector Machine
313
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine
325
A Usage Constrained RoleBased Access Control Model
337
Virtually Free Randomization Techniques for Elliptic Curve Cryptography
348
An Optimized Multibits Blind Watermarking Scheme
360
A Compound Intrusion Detection Model
370
An Efficient Convertible Authenticated Encryption Scheme and Its Variant
382
SpaceEconomical Reassembly for Intrusion Detection System
393
A Functional Decomposition of Virus and Worm Programs
405
Author Index
415
Copyright

Other editions - View all

Common terms and phrases

About the author (2003)

Jianying Zhou holds an M.Sc. in computer science from the Chinese Academy of Sciences and a Ph.D. in information security from the University of London. Dr. Zhou is project manager at Kent Ridge Digital Labs in Singapore, where he leads an R&D team that develops network security technologies. He is actively involved in the academic world, serving on international conference committees and publishing papers for well-known journals.