Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The papers presented were carefully reviewed and selected. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.

Author(s): Charalampos Papamanthou, Roberto Tamassia (auth.), Sihan Qing, Hideki Imai, Guilin Wang (eds.)
Series: Lecture Notes in Computer Science 4861
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 514
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures....Pages 1-15
New Construction of Group Secret Handshakes Based on Pairings....Pages 16-30
n PAKE  +  : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords....Pages 31-43
An Efficient Password-Only Two-Server Authenticated Key Exchange System....Pages 44-56
Formal Definition and Construction of Nominative Signature....Pages 57-68
Short Group Signature Without Random Oracles....Pages 69-82
(Convertible) Undeniable Signatures Without Random Oracles....Pages 83-97
A New Dynamic Accumulator for Batch Updates....Pages 98-112
Preventing Unofficial Information Propagation....Pages 113-125
A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction....Pages 126-140
Privacy Protection on Multiple Sensitive Attributes....Pages 141-152
Audio Watermarking Algorithm Based on Centroid and Statistical Features....Pages 153-163
A Semi-blind Watermarking Based on Discrete Wavelet Transform....Pages 164-176
On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme....Pages 177-188
High Speed Modular Divider Based on GCD Algorithm....Pages 189-200
MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set....Pages 201-215
Compact and Secure Design of Masked AES S-Box....Pages 216-229
Boudot’s Range-Bounded Commitment Scheme Revisited....Pages 230-238
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions....Pages 239-253
Secure Multiparty Computation of DNF....Pages 254-268
Square Like Attack on Camellia....Pages 269-283
Differential Fault Analysis on CLEFIA....Pages 284-295
Extending FORK-256 Attack to the Full Hash Function....Pages 296-305
Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard....Pages 306-318
A Framework for Game-Based Security Proofs....Pages 319-333
What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security....Pages 334-349
Modeling Agreement Problems in the Universal Composability Framework....Pages 350-361
A System Architecture for History-Based Access Control for XML Documents....Pages 362-374
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing....Pages 375-385
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies....Pages 386-397
A Novel Approach for Untrusted Code Execution....Pages 398-411
Detection and Diagnosis of Control Interception....Pages 412-426
BIOS Security Analysis and a Kind of Trusted BIOS....Pages 427-437
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots....Pages 438-451
DDoS Attack Detection Algorithms Based on Entropy Computing....Pages 452-466
Firewall for Dynamic IP Address in Mobile IPv6....Pages 467-479
Application of the PageRank Algorithm to Alarm Graphs....Pages 480-494
Drive-By Pharming....Pages 495-506
Back Matter....Pages -