default search action
6. ICICS 2004: Malaga, Spain
- Javier López, Sihan Qing, Eiji Okamoto:
Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3269, Springer 2004, ISBN 3-540-23563-9 - Michel Abdalla, Bogdan Warinschi:
On the Minimal Assumptions of Group Signature Schemes. 1-13 - Willy Susilo, Yi Mu, Fangguo Zhang:
Perfect Concurrent Signature Schemes. 14-26 - Javier Herranz, Germán Sáez:
New Identity-Based Ring Signature Schemes. 27-39 - Jianying Zhou:
On the Security of a Multi-party Certified Email Protocol. 40-52 - Ventzislav Nikov, Svetla Nikova, Bart Preneel:
Robust Metering Schemes for General Access Structures. 53-65 - Klaus Herrmann, Michael A. Jaeger:
PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks. 66-78 - Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. 79-91 - Ratna Dutta, Rana Barua, Palash Sarkar:
Provably Secure Authenticated Tree Based Group Key Agreement. 92-104 - Yuichi Komano, Kazuo Ohta:
Taxonomic Consideration to OAEP Variants and Their Security. 105-117 - Katja Schmidt-Samoa:
Factorization-Based Fail-Stop Signatures Revisited. 118-131 - Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:
A Qualitative Evaluation of Security Patterns. 132-144 - Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara:
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. 145-157 - Sandra Ring, Eric Cole:
Volatile Memory Computer Forensics to Detect Kernel Level Compromise. 158-170 - Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels:
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. 171-186 - Rakan El-Khalil, Angelos D. Keromytis:
Hydan: Hiding Information in Program Binaries. 187-199 - Luke Hebbes, Andrew P. Lenaghan:
A Semi-fragile Steganographic Digital Signature for Images. 200-210 - Marcel Fernandez, Miguel Soriano:
Identification of Traitors Using a Trellis. 211-222 - Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro:
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. 223-235 - Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh:
Reflector Attack Traceback System with Pushback Based iTrace Mechanism. 236-248 - Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci:
Automatic Covert Channel Analysis of a Multilevel Secure Component. 249-261 - Christopher Lynch, Catherine Meadows:
Sound Approximations to Diffie-Hellman Using Rewrite Rules. 262-277 - Anton Kargl, Götz Wiesend:
On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks. 278-290 - Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee:
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. 291-304 - Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. 305-317 - Oleksiy Mazhelis, Seppo Puuronen, Jari Veijalainen:
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection. 318-330 - Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim:
Threat Analysis on NEtwork MObility (NEMO). 331-342 - Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, Volker Roth:
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. 343-357 - Tao Wan, Evangelos Kranakis, Paul C. van Oorschot:
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). 358-374 - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. 375-387 - Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Security Analysis of the Generalized Self-shrinking Generator. 388-400 - Bo-Yin Yang, Jiun-Ming Chen, Nicolas T. Courtois:
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. 401-413 - Jean Monnerat, Serge Vaudenay:
On Some Weak Extensions of AES and BES. 414-426 - Slobodan Petrovic, Amparo Fúster-Sabater:
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. 427-439 - Mathieu Ciet, Christophe Giraud:
Transient Fault Induction Attacks on XTR. 440-451 - Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen:
Adaptive-CCA on OpenPGP Revisited. 452-464 - Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio:
A New Key-Insulated Signature Scheme. 465-479 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Secure Hierarchical Identity Based Signature and Its Application. 480-494 - Fabien Laguillaumie, Damien Vergnaud:
Multi-designated Verifiers Signatures. 495-507 - Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications. 508-519 - Kihun Hong, Souhwan Jung:
An Efficient Authentication Scheme Using Recovery Information in Signature. 520-531 - Darren Davis, Fabian Monrose, Michael K. Reiter:
Time-Scoped Searching of Encrypted Audit Logs. 532-545 - Habtamu Abie, Pål Spilling, Bent Foyn:
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. 546-562
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.