Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2004, held in Malaga, Spain in October 2004.

The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection.

Author(s): Michel Abdalla, Bogdan Warinschi (auth.), Javier Lopez, Sihan Qing, Eiji Okamoto (eds.)
Series: Lecture Notes in Computer Science 3269
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004

Language: English
Pages: 572
Tags: Data Encryption; Discrete Mathematics in Computer Science; Operating Systems; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks

Front Matter....Pages -
On the Minimal Assumptions of Group Signature Schemes....Pages 1-13
Perfect Concurrent Signature Schemes....Pages 14-26
New Identity-Based Ring Signature Schemes....Pages 27-39
On the Security of a Multi-party Certified Email Protocol....Pages 40-52
Robust Metering Schemes for General Access Structures....Pages 53-65
PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks....Pages 66-78
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN....Pages 79-91
Provably Secure Authenticated Tree Based Group Key Agreement....Pages 92-104
Taxonomic Consideration to OAEP Variants and Their Security....Pages 105-117
Factorization-Based Fail-Stop Signatures Revisited....Pages 118-131
A Qualitative Evaluation of Security Patterns....Pages 132-144
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases....Pages 145-157
Volatile Memory Computer Forensics to Detect Kernel Level Compromise....Pages 158-170
A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet....Pages 171-186
Hydan: Hiding Information in Program Binaries....Pages 187-199
A Semi-fragile Steganographic Digital Signature for Images....Pages 200-210
Identification of Traitors Using a Trellis....Pages 211-222
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation....Pages 223-235
Reflector Attack Traceback System with Pushback Based iTrace Mechanism....Pages 236-248
Automatic Covert Channel Analysis of a Multilevel Secure Component....Pages 249-261
Sound Approximations to Diffie-Hellman Using Rewrite Rules....Pages 262-277
On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks....Pages 278-290
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm....Pages 291-304
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure....Pages 305-317
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection....Pages 318-330
Threat Analysis on NEtwork MObility (NEMO)....Pages 331-342
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept....Pages 343-357
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)....Pages 358-374
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management....Pages 375-387
Security Analysis of the Generalized Self-shrinking Generator....Pages 388-400
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis....Pages 401-413
On Some Weak Extensions of AES and BES....Pages 414-426
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario....Pages 427-439
Transient Fault Induction Attacks on XTR....Pages 440-451
Adaptive-CCA on OpenPGP Revisited....Pages 452-464
A New Key-Insulated Signature Scheme....Pages 465-479
Secure Hierarchical Identity Based Signature and Its Application....Pages 480-494
Multi-designated Verifiers Signatures....Pages 495-507
Dynamic Access Control for Multi-privileged Group Communications....Pages 508-519
An Efficient Authentication Scheme Using Recovery Information in Signature....Pages 520-531
Time-Scoped Searching of Encrypted Audit Logs....Pages 532-545
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems....Pages 546-561
Back Matter....Pages -