Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10–13 October 2003. Among the preceding conferences, ICICS’97 was held in B- jing, China, ICICS’99 in Sydney, Australia, ICICS 2001 in Xi’an, China, and ICICS 2002,in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conferences has been to o?er the attendees the - portunity to discuss the state-of-the-art technology in theoretical and practical aspects of information and communications security. The response to the Call forPaperswassurprising.WhenwewerepreparingtheconferencebetweenApril and May, China, including the conference venue, Huhehaote City, was ?ghting against SARS. Despite this 176 papers were submitted to the conference from 22 countries and regions, and after a competitive selection process, 37 papers from 14 countries and regions were accepted to appear in the proceedings and be presented at ICICS 2003. We would like to take this opportunity to thank all those who submitted papers to ICICS 2003 for their valued contribution to the conference.

Author(s): Wang Feng, Yasuyuki Nogami, Yoshitaka Morikawa (auth.), Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.)
Series: Lecture Notes in Computer Science 2836
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 418
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems

Front Matter....Pages -
A Fast Square Root Computation Using the Frobenius Mapping....Pages 1-10
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption....Pages 11-21
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents....Pages 22-33
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST....Pages 34-46
A Policy Based Framework for Access Control....Pages 47-59
Trading-Off Type-Inference Memory Complexity against Communication....Pages 60-71
Security Remarks on a Group Signature Scheme with Member Deletion....Pages 72-83
An Efficient Known Plaintext Attack on FEA-M....Pages 84-87
An Efficient Public-Key Framework....Pages 88-99
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature....Pages 100-111
Practical Service Charge for P2P Content Distribution....Pages 112-123
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback....Pages 124-135
A Lattice Based General Blind Watermark Scheme....Pages 136-144
Role-Based Access Control and the Access Control Matrix....Pages 145-157
Broadcast Encryption Schemes Based on the Sectioned Key Tree....Pages 158-169
Research on the Collusion Estimation....Pages 170-178
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains....Pages 179-190
Protocols for Malicious Host Revocation....Pages 191-201
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code....Pages 202-213
A Novel Two-Level Trust Model for Grid....Pages 214-225
Practical t-out-n Oblivious Transfer and Its Applications....Pages 226-237
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme....Pages 238-248
ID-Based Distributed “Magic Ink” Signature from Pairings....Pages 249-259
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature....Pages 260-268
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives....Pages 269-279
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems....Pages 280-291
A Novel Efficient Group Signature Scheme with Forward Security....Pages 292-300
Variations of Diffie-Hellman Problem....Pages 301-312
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine....Pages 313-324
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine....Pages 325-336
UC-RBAC: A Usage Constrained Role-Based Access Control Model....Pages 337-347
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography....Pages 348-359
An Optimized Multi-bits Blind Watermarking Scheme....Pages 360-369
A Compound Intrusion Detection Model....Pages 370-381
An Efficient Convertible Authenticated Encryption Scheme and Its Variant....Pages 382-392
Space-Economical Reassembly for Intrusion Detection System....Pages 393-404
A Functional Decomposition of Virus and Worm Programs....Pages 405-414
Back Matter....Pages -