did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540001645

Information and Communications Security : Proceedings of the 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002

by ; ; ;
  • ISBN13:

    9783540001645

  • ISBN10:

    3540001646

  • Format: Paperback
  • Copyright: 2002-12-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $139.00 Save up to $120.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 4th International Conference on Information and Communication Security, ICICS 2002, held in Singapore in December 2002. The 41 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on system security, crypto systems, security protocols, fingerprinting and watermarking, efficient implementation of algorithms, access control, and cryptanalysis and cryptographic techniques.

Table of Contents

System Security I
Defenses against the Truncation of Computation Results of Free-Roaming Agentsp. 1
A Distributed Dynamic ¿Firewall Architecture with Mobile Agents and KeyNote Trust Management Systemp. 13
Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attackp. 25
An Evaluation of Different IP Traceback Approachesp. 37
Security against Inference Attacks on Negative Information in Object-Oriented Databasesp. 49
Cryptosystem I
Robust Key-Evolving Public Key Encryption Schemesp. 61
A Group Signature Scheme Committing the Groupp. 73
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructionsp. 85
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumptionp. 97
Reducing the Memory Complexity of Type-Inference Algorithmsp. 109
Security Protocol I
The Risks of Compromising Secret Informationp. 122
Password-Authenticated Key Exchange between Clients with Different Passwordsp. 134
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auctionp. 147
Attacking Predictable IPsec ESP Initialization Vectorsp. 160
Fingerprinting & Watermarking
An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Codep. 173
A Robust Block Oriented Watermarking Scheme in Spatial Domainp. 184
A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracingp. 197
Efficient Implementation of Algorithms
Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fieldsp. 209
Fast Elliptic Curve Multiplications with SIMD Operationsp. 217
Further Results on Multiples of Primitive Polynomials and Their Products over GF(2)p. 231
System Security II
A Secure Object Sharing Scheme for Java Cardp. 243
IDS Interoperability and Correlation Using IDMEF and Commodity Systemsp. 252
A Synthetic Fraud Data Generation Methodologyp. 265
User Interaction Design for Secure Systemsp. 278
Using Independent Auditors as Intrusion Detection Systemsp. 291
Cryptosystem II
Cellular Automata Based Cryptosystem (CAC)p. 303
New Weak-Key Classes of IDEAp. 315
Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBCp. 327
A New Statistical Testing for Symmetric Ciphers and Hash Functionsp. 342
Message Authentication Codes with Error Correcting Capabilitiesp. 354
Access Control
The Consistency of an Access Control Listp. 367
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policiesp. 374
A Specification Language for Distributed Policy Controlp. 386
Access Control Infrastructure for Digital Objectsp. 399
Security Protocol II
Distributed Key Generation as a Component of an Integrated Protocolp. 411
A Secure Agent-Mediated Payment Protocolp. 422
Cryptanalysis & Cryptographic Techniques
Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Propertiesp. 434
Related-Cipher Attacksp. 447
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1p. 456
Ideal Threshold Schemes from Orthogonal Arraysp. 469
Cryptanalysis of the Reduced-Round RC6p. 480
Author Indexp. 495
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program