Check nearby libraries
Buy this book
Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings
Author: Javier Lopez, Sihan Qing, Eiji Okamoto
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-23563-7
DOI: 10.1007/b101042
Table of Contents:
- On the Minimal Assumptions of Group Signature Schemes
- Perfect Concurrent Signature Schemes
- New Identity-Based Ring Signature Schemes
- On the Security of a Multi-party Certified Email Protocol
- Robust Metering Schemes for General Access Structures
- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks
- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN
- Provably Secure Authenticated Tree Based Group Key Agreement
- Taxonomic Consideration to OAEP Variants and Their Security
- Factorization-Based Fail-Stop Signatures Revisited
- A Qualitative Evaluation of Security Patterns
- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases
- Volatile Memory Computer Forensics to Detect Kernel Level Compromise
- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet
- Hydan: Hiding Information in Program Binaries
- A Semi-fragile Steganographic Digital Signature for Images
- Identification of Traitors Using a Trellis
- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation
- Reflector Attack Traceback System with Pushback Based iTrace Mechanism
- Automatic Covert Channel Analysis of a Multilevel Secure Component
Check nearby libraries
Buy this book
Previews available in: English
Showing 3 featured editions. View all 3 editions?
Edition | Availability |
---|---|
1
Information and Communications Security: 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings
2013, Springer London, Limited
in English
3319027263 9783319027265
|
zzzz
Libraries near you:
WorldCat
|
2
Information and Communications Security: 11th International Conference, ICICS 2009
2010, Springer London, Limited
in English
3642111459 9783642111457
|
zzzz
Libraries near you:
WorldCat
|
3
Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Lecture Notes in Computer Science)
November 23, 2004, Springer
Paperback
in English
- 1 edition
3540235639 9783540235637
|
aaaa
Libraries near you:
WorldCat
|
Book Details
First Sentence
"One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives."
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created April 30, 2008
- 10 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
August 11, 2024 | Edited by MARC Bot | import existing book |
October 17, 2023 | Edited by ImportBot | import existing book |
December 25, 2021 | Edited by ImportBot | import existing book |
December 8, 2020 | Edited by MARC Bot | import existing book |
April 30, 2008 | Created by an anonymous user | Imported from amazon.com record |