Information and Communications Security: 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised full papers presented together with an invited talk were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on access control, public key cryptography and cryptanalysis, security in distributed and mobile systems, cryptanalysis, authentication, fair exchange protocols, anonymity and privacy, software security, proxy cryptosystems, and intrusion detection systems.

Author(s): Bart Preneel (auth.), Miguel Soriano, Sihan Qing, Javier López (eds.)
Series: Lecture Notes in Computer Science 6476 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 474
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Systems and Data Security; Algorithm Analysis and Problem Complexity; Computer Communication Networks

Front Matter....Pages -
Cryptographic Hash Functions: Theory and Practice....Pages 1-3
Rewriting of SPARQL/Update Queries for Securing Data Access....Pages 4-15
Fine-Grained Disclosure of Access Policies....Pages 16-30
Manger’s Attack Revisited....Pages 31-45
Horizontal Correlation Analysis on Exponentiation....Pages 46-61
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts....Pages 62-76
A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks....Pages 77-91
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization....Pages 92-106
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms....Pages 107-125
Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol....Pages 126-139
Compromise-Resilient Anti-jamming for Wireless Sensor Networks....Pages 140-154
On Practical Second-Order Power Analysis Attacks for Block Ciphers....Pages 155-170
Consecutive S-box Lookups: A Timing Attack on SNOW 3G....Pages 171-185
Efficient Authentication for Mobile and Pervasive Computing....Pages 186-202
Security Enhancement and Modular Treatment towards Authenticated Key Exchange....Pages 203-217
Federated Secret Handshakes with Support for Revocation....Pages 218-234
An Agent-Mediated Fair Exchange Protocol....Pages 235-250
A New Method for Formalizing Optimistic Fair Exchange Protocols....Pages 251-265
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme....Pages 266-280
Proving Coercion-Resistance of Scantegrity II....Pages 281-295
Anonymity and Verifiability in Voting: Understanding (Un)Linkability....Pages 296-310
A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms....Pages 311-324
Time Warp: How Time Affects Privacy in LBSs....Pages 325-339
Return-Oriented Rootkit without Returns (on the x86)....Pages 340-354
Experimental Threat Model Reuse with Misuse Case Diagrams....Pages 355-366
Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis....Pages 367-382
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities....Pages 383-400
Ciphertext Policy Attribute-Based Proxy Re-encryption....Pages 401-415
Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks....Pages 416-429
A Trust-Based IDS for the AODV Protocol....Pages 430-444
IDS Alert Visualization and Monitoring through Heuristic Host Selection....Pages 445-458
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method....Pages 459-471
Back Matter....Pages -