Information and Communications Security: Third International Conference, ICICS 2001 Xian, China, November 13–16, 2001 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China, 13-16 November 2001. Among the preceding conferences, ICICS’97 was held in Beijing, China, 11-14 November 1997 and ICICS’99 in Sydney, Australia, 9-11 November 1999. The ICICS’97 and ICICS’99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag’s Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Association for Cryptologic Re- arch (IACR), the International Communications and Information Security - sociation (ICISA), and the Asiacrypt Steering Committee. The format of ICICS 2001 was selected to cover the complete spectrum of - formation and communications security, and to promote participant interaction. The sessions were designed to promote interaction between the major topics of the conference: theoretical foundations of security, secret sharing, network - curity, authentication and identi?cation, boolean functions and stream ciphers, security evaluation, signatures, block ciphers and public-key systems, infor- tion hiding, protocols and their analysis, and cryptanalysis. The 29-member Program Committee considered 134 submissions from 23 di- rent countries and regions, among them 56 papers were accepted for presentation.

Author(s): Claus Peter Schnorr (auth.), Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
Series: Lecture Notes in Computer Science 2229
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2001

Language: English
Pages: 510
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Business Information Systems

Security of Blind Discrete Log Signatures against Interactive Attacks....Pages 1-12
An Intelligent Intruder Model for Security Protocol Analysis....Pages 13-22
Primitive Polynomials over GF(2) — A Cryptologic Approach....Pages 23-34
Unconditionally-Secure Oblivious Transfer....Pages 35-41
Cryptanalysis of the Improved User Efficient Blind Signatures....Pages 42-46
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret....Pages 47-51
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain....Pages 52-61
A Cyclic Window Algorithm for ECC Defined over Extension Fields....Pages 62-73
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves....Pages 74-83
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes....Pages 84-89
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce....Pages 90-94
A New Approach for Secure Multicast Routing in a Large Scale Network....Pages 95-106
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems....Pages 107-118
Dealing with Uncertainties in Risk Analysis Using Belief Functions....Pages 119-130
RBAC for XML Document Stores....Pages 131-143
Cheating Immune Secret Sharing....Pages 144-149
Encryption Sticks (Randomats)....Pages 150-154
Applying NCP Logic to the Analysis of SSL 3.0....Pages 155-166
Performance of WTLS and Its Impact on an M-commerce Transaction....Pages 167-171
Enforcing Obligation with Security Monitors....Pages 172-176
Efficient Software Implementation for Finite Field Multiplication in Normal Basis....Pages 177-188
Playing Lottery on the Internet....Pages 189-201
Privacy Protection for Transactions of Digital Goods....Pages 202-213
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions....Pages 214-220
Threshold Undeniable RSA Signature Scheme....Pages 221-232
Two Simple Batch Verifying Multiple Digital Signatures....Pages 233-237
Square Attack on Reduced Camellia Cipher....Pages 238-245
Generalization of Elliptic Curve Digital Signature Schemes....Pages 246-250
Reasoning about Accountability within Delegation....Pages 251-260
A Novel Data Hiding Method for Two-Color Images....Pages 261-270
An Identification Scheme Provably Secure against Reset Attack....Pages 271-279
Estimating the Scalability of the Internet Key Exchange....Pages 280-291
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes....Pages 292-303
Defeating Denial-of-Service Attacks on the Internet....Pages 304-315
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications....Pages 316-327
A Unified Methodology for Verification and Synthesis of Firewall Configurations....Pages 328-339
Quantifying Network Denial of Service: A Location Service Case Study....Pages 340-351
A Public Key Cryptosystem Based on the Subgroup Membership Problem....Pages 352-363
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network....Pages 364-370
NIDS Research Based on Artificial Immunology....Pages 371-375
AMBAR Protocol: Access Management Based on Authorization Reduction....Pages 376-380
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication....Pages 381-385
Dispatching Mobile Agents with Secure Routes in Parallel....Pages 386-397
TH-SMS: Security Management System in Advanced Computational Infrastructure....Pages 398-407
Cryptography and Middleware Security....Pages 408-418
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes....Pages 419-428
A Role-Based Model for Access Control in Database Federations....Pages 429-440
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls....Pages 441-450
A Digital Nominative Proxy Signature Scheme for Mobile Communication....Pages 451-455
Hierarchical Simulation Model with Animation for Large Network Security....Pages 456-460
Fair Electronic Cash Based on a Group Signature Scheme....Pages 461-465
Fair Exchange of Digital Signatures with Offline Trusted Third Party....Pages 466-470
SECUSIM: A Tool for the Cyber-Attack Simulation....Pages 471-475
A New Semantics of Authentication Logic....Pages 476-482
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles....Pages 483-494
Redundancy, Obscurity, Self-Containment & Independence....Pages 495-501