default search action
11. ICICS 2009: Beijing, China
- Sihan Qing, Chris J. Mitchell, Guilin Wang:
Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings. Lecture Notes in Computer Science 5927, Springer 2009, ISBN 978-3-642-11144-0
Invited Talks
- Richard A. Kemmerer:
How to Steal a Botnet and What Can Happen When You Do. 1 - Wenbo Mao:
A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing. 2
Cryptanalysis
- Yang Li, Kazuo Sakiyama, Shin-ichi Kawamura, Yuichi Komano, Kazuo Ohta:
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. 3-16 - Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang:
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. 17-31
Algorithms and Implementations
- Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara:
The rakaposhi Stream Cipher. 32-46 - Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Joshi:
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes. 47-62 - Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger:
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems. 63-79
Public Key Cryptography
- Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Online/Offline Ring Signature Scheme. 80-90 - Pairat Thorncharoensri, Willy Susilo, Yi Mu:
Policy-Controlled Signatures. 91-106 - Puwen Wei, Xiaoyun Wang, Yuliang Zheng:
Public Key Encryption without Random Oracle Made Truly Practical. 107-120 - Yi-Ruei Chen, Wen-Guey Tzeng:
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate. 121-134
Security Applications
- Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. 135-149 - Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng:
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. 150-164 - Marina Blanton, William M. P. Hudelson:
Biometric-Based Non-transferable Anonymous Credentials. 165-180
Software Security
- Ghassan Karame, Mario Strasser, Srdjan Capkun:
Secure Remote Execution of Sequential Computations. 181-197 - Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang:
Architecture- and OS-Independent Binary-Level Dynamic Test Generation. 198-210
System Security
- Chunyan Mu:
Measuring Information Flow in Reactive Processes. 211-225 - Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang, Zhong Chen:
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. 226-240 - Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia:
Denial-of-Service Attacks on Host-Based Generic Unpackers. 241-253
Network Security
- Lucas Vespa, Mini Mathew, Ning Weng:
Predictive Pattern Matching for Scalable Network Intrusion Detection. 254-267 - Lucas Vespa, Ning Weng:
Deterministic Finite Automata Characterization for Memory-Based Pattern Matching. 268-282 - Zhengmin Xia, Songnian Lu, Jianhua Li, Aixin Zhang:
A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold. 283-292 - Huijun Xiong, Prateek Malhotra, Deian Stefan, Chehai Wu, Danfeng Yao:
User-Assisted Host-Based Detection of Outbound Malware Traffic. 293-307 - Tomas Olsson:
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence. 308-324
Short Papers I
- Christoph L. Schuba:
Using the (Open) Solaris Service Management Facility as a Building Block for System Security. 325-335 - Ping Chen, Hao Han, Yi Wang, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. 336-345 - Gunmeet Singh, Sarbjeet Singh:
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]. 346-358
Database Security
- Xin-Jing Ge, Jian-Ming Zhu:
Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining. 359-369 - Yuan Tian, Hao Zhang:
GUC-Secure Join Operator in Distributed Relational Database. 370-384
Trust Management
- Guangquan Xu, Zhiyong Feng, Xiaohong Li, Hutong Wu, Yongxin Yu, Shizhan Chen, Guozheng Rao:
TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics. 385-395 - Yan Zhang, Zhengde Zhai, Dengguo Feng:
Bring Efficient Connotation Expressible Policies to Trust Management. 396-410 - Fuzhi Zhang, Long Bai, Feng Gao:
A User Trust-Based Collaborative Filtering Recommendation Algorithm. 411-424
Applied Cryptography
- Yi Shi, Kanta Matsuura:
Fingerprinting Attack on the Tor Anonymity System. 425-438 - Chuangui Ma, Xiaofei Ding:
Proactive Verifiable Linear Integer Secret Sharing Scheme. 439-448 - Mitra Fatemi, Taraneh Eghlidos, Mohammad Reza Aref:
A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach. 449-458 - Xiangyang Wang, Tianxiao Ma, Panpan Niu:
Digital Audio Watermarking Technique Using Pseudo-Zernike Moments. 459-473
Short Papers II
- Masatoshi Noguchi, Manabu Inuma, Rie Shigetomi, Hideki Imai:
An Image Sanitizing Scheme Using Digital Watermarking. 474-482 - Huafei Zhu, Feng Bao:
Adaptive and Composable Oblivious Transfer Protocols (Short Paper). 483-492 - Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. 493-502
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.