Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings
Petra Perner, Dieter Gollmann, Jianying Zhou
Springer, Nov 13, 2003 - Computer security - 416 pages
This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003. The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic protocols, oblivious transfer, fingerprinting schemes, security verification, TCP/IP security, support vector machine, intrusion detection, and authenticated encryption schemes.
What people are saying - Write a review
We haven't found any reviews in the usual places.
A Fast Square Root Computation Using the Frobenius Mapping
Secure Route Structures for the Fast Dispatch of LargeScale
A Policy Based Framework for Access Control
17 other sections not shown
Other editions - View all
access control algorithm Alice applet authenticated encryption blind signature blocks certificate Computer Science covert channel Cryptography cryptosystem database decryption defined deleted denoted Diffie-Hellman problem discrete logarithm dispatch distributed domain efficient elliptic curve embedding evaluation fragment framework function grid group member group signature group signature scheme hash hash chain host image ICICS IEEE implemented input integer intrusion detection IP packet ITrace ITrace-CP key management LNCS method mobile agents mod q oblivious transfer operation paper parameters performance polynomial Proceedings protocol PSNR public key random RBAC RBPIM receiver revocation revoked ring signature robustness role ticket role-based access control route routers secret key secret sharing security policy sends sequence signature image signer Springer-Verlag Support Vector Machine TCP/IP temporal logic Theorem Traceback traitors trapdoor trust valid verifier virus watermarked image watermarking scheme