Information and Communications Security

6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Lecture Notes in Computer Science)

1 edition
  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read


Download Options

Buy this book

Last edited by ImportBot
October 17, 2023 | History

Information and Communications Security

6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Lecture Notes in Computer Science)

1 edition
  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings
Author: Javier Lopez, Sihan Qing, Eiji Okamoto
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-23563-7
DOI: 10.1007/b101042

Table of Contents:

  • On the Minimal Assumptions of Group Signature Schemes
  • Perfect Concurrent Signature Schemes
  • New Identity-Based Ring Signature Schemes
  • On the Security of a Multi-party Certified Email Protocol
  • Robust Metering Schemes for General Access Structures
  • PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks
  • Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN
  • Provably Secure Authenticated Tree Based Group Key Agreement
  • Taxonomic Consideration to OAEP Variants and Their Security
  • Factorization-Based Fail-Stop Signatures Revisited
  • A Qualitative Evaluation of Security Patterns
  • Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases
  • Volatile Memory Computer Forensics to Detect Kernel Level Compromise
  • A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet
  • Hydan: Hiding Information in Program Binaries
  • A Semi-fragile Steganographic Digital Signature for Images
  • Identification of Traitors Using a Trellis
  • Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation
  • Reflector Attack Traceback System with Pushback Based iTrace Mechanism
  • Automatic Covert Channel Analysis of a Multilevel Secure Component

Publish Date
Publisher
Springer
Language
English
Pages
564

Buy this book

Previews available in: English

Book Details


First Sentence

"One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives."

Classifications

Library of Congress
QA76.9.A25 I554 2004, QA75.5-76.95

The Physical Object

Format
Paperback
Number of pages
564
Dimensions
9.1 x 5.9 x 1.4 inches
Weight
1.8 pounds

ID Numbers

Open Library
OL9836951M
Internet Archive
springer_10.1007-b101042
ISBN 10
3540235639
ISBN 13
9783540235637
LCCN
2004113914

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
October 17, 2023 Edited by ImportBot import existing book
December 25, 2021 Edited by ImportBot import existing book
December 8, 2020 Edited by MARC Bot import existing book
September 28, 2018 Edited by MARC Bot correction
April 30, 2008 Created by an anonymous user Imported from amazon.com record