Limit search to available items
Book Cover
E-book
Author ICICS (Conference) (13th : 2011 : Beijing, China)

Title Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings / Sihan Qing [and others] (eds.)
Published Berlin ; New York : Springer, ©2011

Copies

Description 1 online resource (xiv, 432 pages)
Series Lecture notes in computer science, 0302-9743 ; 7043
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7043.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Machine generated contents note: Digital Signatures -- Forward Secure Ring Signature without Random Oracles / Jianying Zhou -- Ring Signature Schemes from Lattice Basis Delegation / Bo Sun -- Public Key Encryption -- Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles / Ting Yu -- Variant of Boyen-Waters Anonymous IBE Scheme / Sihan Qing -- Non-interactive Opening for Ciphertexts Encrypted by Shared Keys / Atsuko Miyaji -- Cryptographic Protocols -- Lightweight RFID Mutual Authentication Protocol against Feasible Problems / Zhong Chen -- Note on a Privacy-Preserving Distance-Bounding Protocol / Pedro Peris-Lopez -- Delegable Provable Data Possession for Remote Data in the Clouds / Wen-Guey Tzeng -- Unconditionally Secure Oblivious Transfer Based on Channel Delays / Atsuko Miyaji -- Applied Cryptography -- Preserving Security and Privacy in Large-Scale VANETs / Lei Zhang -- Probabilistic Secret Sharing Scheme for a Compartmented Access Structure / Mingsheng Wang -- Ideal Secret Sharing Schemes with Share Selectability / Masakazu Soshi -- Multimedia Security -- Novel Pyramidal Dual-Tree Directional Filter Bank Domain Color Image Watermarking Algorithm / Mingyu Lu -- Detection for Multiplicative Watermarking in DCT Domain by Cauchy Model / Xinshan Zhu -- Algorithms and Evaluation -- Extension of Barreto-Voloch Root Extraction Method / Xiao Fan -- Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions / Fangguo Zhang -- Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA / Wuqiong Pan -- Cryptanalysis -- First Differential Attack on Full 32-Round GOST / Michal Misztal -- Collision Attack for the Hash Function Extended MD4 / Gaoli Wang -- Linear Cryptanalysis of ARIA Block Cipher / Wei Li
Note continued: Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha / Yutaka Miyake -- Security Applications -- Behavior Analysis-Based Dynamic Trust Measurement Model / Wenbing Zhao -- Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications / Tianze Wang -- Analyzing the Performance of Dither Modulation in Presence of Composite Attacks / Xinshan Zhu -- Wireless Network Security -- Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks / Feng Bao -- Unified Security Framework for Multi-domain Wireless Mesh Networks / Xixi Wei -- System Security -- Ontology Model-Based Static Analysis of Security Vulnerabilities / Yin-Hang Jing -- Multi-compositional Enforcement on Information Flow Security / Jianfeng Ma -- HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming / Peng Liu -- Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching Scores / Phalguni Gupta -- Network Security -- Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization / Ren Ping Liu -- Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation / Ali A. Ghorbani -- Minimising Anonymity Loss in Anonymity Networks under DoS Attacks / Vladimiro Sassone
Summary Annotation This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security
Analysis Computer science
Computer Communication Networks
Data protection
Data structures (Computer science)
Data encryption (Computer science)
Coding theory
Computer software
Data Structures, Cryptology and Information Theory
Coding and Information Theory
Systems and Data Security
Algorithm Analysis and Problem Complexity
Bibliography Includes bibliographical references and author index
Subject Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Computer security -- Congresses
Informatique.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Qing, Sihan.
ISBN 9783642252433
3642252435
Other Titles ICICS 2011