Information and Communications Security: 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, Volume 4

Front Cover
Robert Deng, Robert H. Deng
Springer Science & Business Media, Nov 14, 2002 - Business & Economics - 496 pages
This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.

From inside the book

Contents

Defenses against the Truncation of Computation Results of FreeRoaming Agents
1
A Distributed Dynamic μFirewall Architecture with Mobile Agents and KeyNote Trust Management System
13
Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack
25
An Evaluation of Different IP Traceback Approaches
37
Security against Inference Attacks on Negative Information in ObjectOriented Databases
49
Robust KeyEvolving Public Key Encryption Schemes
61
A Group Signature Scheme Committing the Group
73
Models Bounds and Constructions
85
A Synthetic Fraud Data Generation Methodology
265
User Interaction Design for Secure Systems
278
Using Independent Auditors as Intrusion Detection Systems
291
Cellular Automata Based Cryptosystem CAC
303
New WeakKey Classes of IDEA
315
Risks with RawKey Masking The Security Evaluation of 2Key XCBC
327
A New Statistical Testing for Symmetric Ciphers and Hash Functions
342
Message Authentication Codes with Error Correcting Capabilities
354

Anonymous Fingerprinting as Secure as the Bilinear DiffieHellman Assumption
97
Reducing the Memory Complexity of TypeInference Algorithms
109
The Risks of Compromising Secret Information
122
PasswordAuthenticated Key Exchange between Clients with Different Passwords
134
Robust Privacy Protecting and Publicly Verifiable SealedBid Auction
147
Attacking Predictable IPsec ESP Initialization Vectors
160
An ID Coding Scheme for Fingerprinting Randomized cSecure CRT Code
173
A Robust Block Oriented Watermarking Scheme in Spatial Domain
184
A Flexibly Revocable KeyDistribution Scheme for Efficient BlackBox Tracing
197
Low Complexity Bit Serial Systolic Multipliers over GF2m for Three Classes of Finite Fields
209
Fast Elliptic Curve Multiplications with SIMD Operations
217
Further Results on Multiples of Primitive Polynomials and Their Products over GF2
231
A Secure Object Sharing Scheme for Java Card
243
IDS Interoperability and Correlation Using IDMEF and Commodity Systems
252
The Consistency of an Access Control List
367
KnowledgeBased Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies
374
A Specification Language for Distributed Policy Control
386
Access Control Infrastructure for Digital Objects
399
Distributed Key Generation as a Component of an Integrated Protocol
411
A Secure AgentMediated Payment Protocol
422
Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
434
RelatedCipher Attacks
447
A Chosen Plaintext Linear Attack on Block Cipher CIKS1
456
Ideal Threshold Schemes from Orthogonal Arrays
469
Cryptanalysis of the ReducedRound RC6
480
Author Index
495
Copyright

Other editions - View all

Common terms and phrases