


default search action
6. ICICS 2004: Malaga, Spain
- Javier López, Sihan Qing, Eiji Okamoto:

Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3269, Springer 2004, ISBN 3-540-23563-9 - Michel Abdalla

, Bogdan Warinschi:
On the Minimal Assumptions of Group Signature Schemes. 1-13 - Willy Susilo

, Yi Mu, Fangguo Zhang
:
Perfect Concurrent Signature Schemes. 14-26 - Javier Herranz, Germán Sáez:

New Identity-Based Ring Signature Schemes. 27-39 - Jianying Zhou:

On the Security of a Multi-party Certified Email Protocol. 40-52 - Ventzislav Nikov, Svetla Nikova, Bart Preneel:

Robust Metering Schemes for General Access Structures. 53-65 - Klaus Herrmann, Michael A. Jaeger:

PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks. 66-78 - Tieyan Li, Yongdong Wu, Di Ma

, Huafei Zhu, Robert H. Deng
:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. 79-91 - Ratna Dutta, Rana Barua, Palash Sarkar:

Provably Secure Authenticated Tree Based Group Key Agreement. 92-104 - Yuichi Komano, Kazuo Ohta:

Taxonomic Consideration to OAEP Variants and Their Security. 105-117 - Katja Schmidt-Samoa:

Factorization-Based Fail-Stop Signatures Revisited. 118-131 - Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:

A Qualitative Evaluation of Security Patterns. 132-144 - Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara:

Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. 145-157 - Sandra Ring, Eric Cole:

Volatile Memory Computer Forensics to Detect Kernel Level Compromise. 158-170 - Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels:

A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. 171-186 - Rakan El-Khalil, Angelos D. Keromytis:

Hydan: Hiding Information in Program Binaries. 187-199 - Luke Hebbes, Andrew P. Lenaghan:

A Semi-fragile Steganographic Digital Signature for Images. 200-210 - Marcel Fernandez, Miguel Soriano:

Identification of Traitors Using a Trellis. 211-222 - Joaquín García

, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro
:
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. 223-235 - Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh:

Reflector Attack Traceback System with Pushback Based iTrace Mechanism. 236-248 - Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci:

Automatic Covert Channel Analysis of a Multilevel Secure Component. 249-261 - Christopher Lynch, Catherine Meadows:

Sound Approximations to Diffie-Hellman Using Rewrite Rules. 262-277 - Anton Kargl, Götz Wiesend:

On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks. 278-290 - Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee:

New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. 291-304 - Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:

Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. 305-317 - Oleksiy Mazhelis, Seppo Puuronen, Jari Veijalainen:

Modelling Dependencies Between Classifiers in Mobile Masquerader Detection. 318-330 - Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim:

Threat Analysis on NEtwork MObility (NEMO). 331-342 - Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, Volker Roth:

Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. 343-357 - Tao Wan, Evangelos Kranakis, Paul C. van Oorschot

:
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). 358-374 - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:

Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. 375-387 - Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:

Security Analysis of the Generalized Self-shrinking Generator. 388-400 - Bo-Yin Yang, Jiun-Ming Chen, Nicolas T. Courtois:

On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. 401-413 - Jean Monnerat, Serge Vaudenay:

On Some Weak Extensions of AES and BES. 414-426 - Slobodan Petrovic, Amparo Fúster-Sabater:

Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. 427-439 - Mathieu Ciet, Christophe Giraud

:
Transient Fault Induction Attacks on XTR. 440-451 - Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen:

Adaptive-CCA on OpenPGP Revisited. 452-464 - Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio:

A New Key-Insulated Signature Scheme. 465-479 - Sherman S. M. Chow

, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Secure Hierarchical Identity Based Signature and Its Application. 480-494 - Fabien Laguillaumie, Damien Vergnaud:

Multi-designated Verifiers Signatures. 495-507 - Di Ma

, Robert H. Deng
, Yongdong Wu, Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications. 508-519 - Kihun Hong, Souhwan Jung:

An Efficient Authentication Scheme Using Recovery Information in Signature. 520-531 - Darren Davis, Fabian Monrose, Michael K. Reiter:

Time-Scoped Searching of Encrypted Audit Logs. 532-545 - Habtamu Abie, Pål Spilling, Bent Foyn:

Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. 546-562

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














