Stop the war!
Остановите войну!
for scientists:
default search action
7. ICICS 2005: Beijing, China
- Sihan Qing, Wenbo Mao, Javier López, Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings. Lecture Notes in Computer Science 3783, Springer 2005, ISBN 3-540-30934-9
Fair Exchange
- Kenji Imamoto, Jianying Zhou, Kouichi Sakurai:
An Evenhanded Certified Email System for Contract Signing. 1-13 - Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou:
Efficient ID-Based Optimistic Fair Exchange with Provable Security. 14-26 - J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti:
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. 27-39 - Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai:
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. 40-52
Digital Signatures I
- Shuhong Wang, Feng Bao, Robert H. Deng:
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. 53-60 - Yong Li, Helger Lipmaa, Dingyi Pei:
On Delegatability of Four Designated Verifier Signatures. 61-71 - Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka:
PIATS: A Partially Sanitizable Signature Scheme. 72-83
Cryptographic Protocols
- Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Ciphertext Comparison, a New Solution to the Millionaire Problem. 84-96 - Sven Laur, Helger Lipmaa, Taneli Mielikäinen:
Private Itemset Support Counting. 97-111 - Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka:
Visual Cryptographic Protocols Using the Trusted Initializer. 112-122 - Alaaeddine Fellah, John Mullins:
Admissible Interference by Typing for Cryptographic Protocols. 123-135
Cryptanalysis
- Raphael Chung-Wei Phan, Bok-Min Goi:
On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. 136-146 - Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL. 147-158 - Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi:
Cryptanalysis of PASS II and MiniPass. 159-168 - Yasuyuki Sakai, Kouichi Sakurai:
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. 169-180
Digital Signatures II
- Khanh Nguyen:
Asymmetric Concurrent Signatures. 181-193 - Sherman S. M. Chow, Willy Susilo:
Generic Construction of (Identity-Based) Perfect Concurrent Signatures. 194-206 - Huafei Zhu, Feng Bao, Robert H. Deng:
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. 207-219
Network Security
- Xin Li, Zhenzhou Ji, Mingzeng Hu:
Session Table Architecture for Defending SYN Flood Attack. 220-230 - Song Huang, Ling Zhang, Shouling Dong:
A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks. 231-242 - Lanjia Wang, Hai-Xin Duan, Xing Li:
Port Scan Behavior Diagnosis by Clustering. 243-255 - Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian:
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). 256-268
Applied Cryptography
- Wei Wei, Xuhua Ding, Kefei Chen:
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. 269-279 - Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang:
Secure Multicast Using Proxy Encryption. 280-290 - Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater:
Efficient and Non-interactive Timed-Release Encryption. 291-303
Key Management
- Qiang Tang, Chris J. Mitchell:
Security Properties of Two Authenticated Conference Key Agreement Protocols. 304-314 - Eun-Jun Yoon, Kee-Young Yoo:
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. 315-322 - Sangjin Kim, Hoonjung Lee, Heekuck Oh:
Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment. 323-335
Access Control
- Lan Li, Xinghao Jiang, Jianhua Li:
Enforce Mandatory Access Control Policy on XML Documents. 336-349 - Pan Wang, Peng Ning, Douglas S. Reeves:
Network Access Control for Mobile Ad-Hoc Networks. 350-362 - Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis:
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. 363-375
Applications
- Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou:
Authenticating Query Results in Data Publishing. 376-388 - Tieyan Li, Huafei Zhu, Yongdong Wu:
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. 389-401 - Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu:
Batching SSL/TLS Handshake Improved. 402-413 - Lucas Ballard, Seny Kamara, Fabian Monrose:
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. 414-426
Watermarking
- David Megías, Jordi Herrera-Joancomartí, Julià Minguillón:
Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio. 427-440 - Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka:
Reversible Watermark with Large Capacity Using the Predictive Coding. 441-453
System Security
- Hyunsang Choi, Heejo Lee:
PCAV: Internet Attack Visualization on Parallel Coordinates. 454-466 - Yi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi:
Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA. 467-480 - Jiazhu Dai, Huaikou Miao:
D_DIPS: An Intrusion Prevention System for Database Security. 481-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.