default search action
9. ICICS 2007: Zhengzhou, China
- Sihan Qing, Hideki Imai, Guilin Wang:
Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings. Lecture Notes in Computer Science 4861, Springer 2008, ISBN 978-3-540-77047-3
Authentication and Key Exchange
- Charalampos Papamanthou, Roberto Tamassia:
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. 1-15 - Lan Zhou, Willy Susilo, Yi Mu:
New Construction of Group Secret Handshakes Based on Pairings. 16-30 - Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel:
n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. 31-43 - Haimin Jin, Duncan S. Wong, Yinlong Xu:
An Efficient Password-Only Two-Server Authenticated Key Exchange System. 44-56
Digital Signatures
- Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Formal Definition and Construction of Nominative Signature. 57-68 - Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin:
Short Group Signature Without Random Oracles. 69-82 - Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo:
(Convertible) Undeniable Signatures Without Random Oracles. 83-97
Applications
- Peishun Wang, Huaxiong Wang, Josef Pieprzyk:
A New Dynamic Accumulator for Batch Updates. 98-112 - Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon:
Preventing Unofficial Information Propagation. 113-125 - B. John Oommen, Ebaa Fayyoumi:
A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction. 126-140 - Zhen Li, Xiaojun Ye:
Privacy Protection on Multiple Sensitive Attributes. 141-152
Watermarking
- Xiaoming Zhang, Xiong Yin:
Audio Watermarking Algorithm Based on Centroid and Statistical Features. 153-163 - Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu:
A Semi-blind Watermarking Based on Discrete Wavelet Transform. 164-176
Fast Implementations
- Qianli Zhang, Jilong Wang, Xing Li:
On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme. 177-188 - Abdulah Abdulah Zadeh:
High Speed Modular Divider Based on GCD Algorithm. 189-200 - Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li:
MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set. 201-215 - Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani:
Compact and Secure Design of Masked AES S-Box. 216-229
Applied Cryptography
- Zhengjun Cao, Lihua Liu:
Boudot's Range-Bounded Commitment Scheme Revisited. 230-238 - Rui Xue, Dengguo Feng:
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. 239-253 - Kun Peng:
Secure Multiparty Computation of DNF. 254-268
Cryptanalysis
- Duo Lei, Chao Li, Keqin Feng:
Square Like Attack on Camellia. 269-283 - Hua Chen, Wenling Wu, Dengguo Feng:
Differential Fault Analysis on CLEFIA. 284-295 - Scott Contini, Krystian Matusiewicz, Josef Pieprzyk:
Extending FORK-256 Attack to the Full Hash Function. 296-305 - Jiqiang Lu:
Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. 306-318
Formal Analysis
- David Nowak:
A Framework for Game-Based Security Proofs. 319-333 - Xiaowei Huang, Li Jiao, Weiming Lu:
What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security. 334-349 - Masayuki Terada, Kazuki Yoneyama, Sadayuki Hongo, Kazuo Ohta:
Modeling Agreement Problems in the Universal Composability Framework. 350-361
System Security I
- Patrick Röder, Omid Tafreschi, Fredrik Mellgren, Claudia Eckert:
A System Architecture for History-Based Access Control for XML Documents. 362-374 - Mooseop Kim, Jaecheol Ryou:
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. 375-385 - Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis:
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. 386-397
System Security II
- Yan Wen, Jinjing Zhao, Huaimin Wang:
A Novel Approach for Untrusted Code Execution. 398-411 - Chang-Hsien Tsai, Shih-Kun Huang:
Detection and Diagnosis of Control Interception. 412-426 - ZhenLiu Zhou, RongSheng Xu:
BIOS Security Analysis and a Kind of Trusted BIOS. 427-437 - Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou:
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. 438-451
Network Security
- Liying Li, Jianying Zhou, Ning Xiao:
DDoS Attack Detection Algorithms Based on Entropy Computing. 452-466 - Ying Qiu, Feng Bao, Jianying Zhou:
Firewall for Dynamic IP Address in Mobile IPv6. 467-479 - James J. Treinen, Ramakrishna Thurimella:
Application of the PageRank Algorithm to Alarm Graphs. 480-494 - Sid Stamm, Zulfikar Ramzan, Markus Jakobsson:
Drive-By Pharming. 495-506
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.