Information and Communications Security: 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, Volume 4Robert Deng, Robert H. Deng This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did. |
Contents
Defenses against the Truncation of Computation Results of FreeRoaming Agents | 1 |
A Distributed Dynamic μFirewall Architecture with Mobile Agents and KeyNote Trust Management System | 13 |
Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack | 25 |
An Evaluation of Different IP Traceback Approaches | 37 |
Security against Inference Attacks on Negative Information in ObjectOriented Databases | 49 |
Robust KeyEvolving Public Key Encryption Schemes | 61 |
A Group Signature Scheme Committing the Group | 73 |
Models Bounds and Constructions | 85 |
A Synthetic Fraud Data Generation Methodology | 265 |
User Interaction Design for Secure Systems | 278 |
Using Independent Auditors as Intrusion Detection Systems | 291 |
Cellular Automata Based Cryptosystem CAC | 303 |
New WeakKey Classes of IDEA | 315 |
Risks with RawKey Masking The Security Evaluation of 2Key XCBC | 327 |
A New Statistical Testing for Symmetric Ciphers and Hash Functions | 342 |
Message Authentication Codes with Error Correcting Capabilities | 354 |
Anonymous Fingerprinting as Secure as the Bilinear DiffieHellman Assumption | 97 |
Reducing the Memory Complexity of TypeInference Algorithms | 109 |
The Risks of Compromising Secret Information | 122 |
PasswordAuthenticated Key Exchange between Clients with Different Passwords | 134 |
Robust Privacy Protecting and Publicly Verifiable SealedBid Auction | 147 |
Attacking Predictable IPsec ESP Initialization Vectors | 160 |
An ID Coding Scheme for Fingerprinting Randomized cSecure CRT Code | 173 |
A Robust Block Oriented Watermarking Scheme in Spatial Domain | 184 |
A Flexibly Revocable KeyDistribution Scheme for Efficient BlackBox Tracing | 197 |
Low Complexity Bit Serial Systolic Multipliers over GF2m for Three Classes of Finite Fields | 209 |
Fast Elliptic Curve Multiplications with SIMD Operations | 217 |
Further Results on Multiples of Primitive Polynomials and Their Products over GF2 | 231 |
A Secure Object Sharing Scheme for Java Card | 243 |
IDS Interoperability and Correlation Using IDMEF and Commodity Systems | 252 |
The Consistency of an Access Control List | 367 |
KnowledgeBased Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies | 374 |
A Specification Language for Distributed Policy Control | 386 |
Access Control Infrastructure for Digital Objects | 399 |
Distributed Key Generation as a Component of an Integrated Protocol | 411 |
A Secure AgentMediated Payment Protocol | 422 |
Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties | 434 |
RelatedCipher Attacks | 447 |
A Chosen Plaintext Linear Attack on Block Cipher CIKS1 | 456 |
Ideal Threshold Schemes from Orthogonal Arrays | 469 |
Cryptanalysis of the ReducedRound RC6 | 480 |
495 | |
Other editions - View all
Information and Communications Security: 4th International ..., Volume 4 Robert Deng,Robert H. Deng No preview available - 2002 |
Common terms and phrases
2-key XCBC access control Advances in Cryptology adversary agent alerts algorithm Alice attack packet auctioneers authentication bidder bids binary bits block cipher Boolean function certificate ciphertext Computer consider construction cryptographic Cryptology cryptosystem database decoder decryption defined denote dictionary attack discrete logarithm distributed ECADD ECDBL efficient elliptic curve encoding encryption error execution fingerprinting firewall group signature hash functions host ICICS IEEE implementation input integer Intrusion Detection IPsec iTrace Java Card key schedule Lemma linear LNCS method object operation orthogonal array output paper parameters plaintext players pointer primitive polynomials private key probability problem proposed protocol public key random round scheme secret key secret sharing Section server session key SIMD simulation Springer-Verlag Step subkeys t-nomial multiples Table Theorem tion transform variables vector verify watermarked x²-value