Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi’an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o?er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.

Author(s): Kenji Imamoto, Jianying Zhou, Kouichi Sakurai (auth.), Sihan Qing, Wenbo Mao, Javier López, Guilin Wang (eds.)
Series: Lecture Notes in Computer Science 3783 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 498
Tags: Data Encryption; Operating Systems; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
An Evenhanded Certified Email System for Contract Signing....Pages 1-13
Efficient ID-Based Optimistic Fair Exchange with Provable Security....Pages 14-26
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol....Pages 27-39
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery....Pages 40-52
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security....Pages 53-60
On Delegatability of Four Designated Verifier Signatures....Pages 61-71
PIATS: A Partially Sanitizable Signature Scheme....Pages 72-83
Ciphertext Comparison, a New Solution to the Millionaire Problem....Pages 84-96
Private Itemset Support Counting....Pages 97-111
Visual Cryptographic Protocols Using the Trusted Initializer....Pages 112-122
Admissible Interference by Typing for Cryptographic Protocols....Pages 123-135
On the Security Bounds of CMC, EME, EME  +  and EME * Modes of Operation....Pages 136-146
On the Security of Encryption Modes of MD4, MD5 and HAVAL....Pages 147-158
Cryptanalysis of PASS II and MiniPass....Pages 159-168
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves....Pages 169-180
Asymmetric Concurrent Signatures....Pages 181-193
Generic Construction of (Identity-Based) Perfect Concurrent Signatures....Pages 194-206
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains....Pages 207-219
Session Table Architecture for Defending SYN Flood Attack....Pages 220-230
A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks....Pages 231-242
Port Scan Behavior Diagnosis by Clustering....Pages 243-255
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)....Pages 256-268
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails....Pages 269-279
Secure Multicast Using Proxy Encryption....Pages 280-290
Efficient and Non-interactive Timed-Release Encryption....Pages 291-303
Security Properties of Two Authenticated Conference Key Agreement Protocols....Pages 304-314
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity....Pages 315-322
Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment....Pages 323-335
Enforce Mandatory Access Control Policy on XML Documents....Pages 336-349
Network Access Control for Mobile Ad-Hoc Networks....Pages 350-362
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware....Pages 363-375
Authenticating Query Results in Data Publishing....Pages 376-388
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream....Pages 389-401
Batching SSL/TLS Handshake Improved....Pages 402-413
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data....Pages 414-426
Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio....Pages 427-440
Reversible Watermark with Large Capacity Using the Predictive Coding....Pages 441-453
PCAV: Internet Attack Visualization on Parallel Coordinates....Pages 454-466
Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA....Pages 467-480
D_DIPS: An Intrusion Prevention System for Database Security....Pages 481-490
Back Matter....Pages -