Information and Communications Security [electronic resource] : 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings /

This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.

Saved in:
Bibliographic Details
Main Authors: Deng, Robert. editor., Bao, Feng. editor., Zhou, Jianying. editor., Qing, Sihan. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2002
Subjects:Computer science., Computer communication systems., Operating systems (Computers)., Data encryption (Computer science)., Computer science, Management information systems., Computer Science., Data Encryption., Computer Communication Networks., Operating Systems., Discrete Mathematics in Computer Science., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/3-540-36159-6
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:210022
record_format koha
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computer science
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Discrete Mathematics in Computer Science.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computer science
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Discrete Mathematics in Computer Science.
Management of Computing and Information Systems.
spellingShingle Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computer science
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Discrete Mathematics in Computer Science.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computer science
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Discrete Mathematics in Computer Science.
Management of Computing and Information Systems.
Deng, Robert. editor.
Bao, Feng. editor.
Zhou, Jianying. editor.
Qing, Sihan. editor.
SpringerLink (Online service)
Information and Communications Security [electronic resource] : 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings /
description This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.
format Texto
topic_facet Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computer science
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Discrete Mathematics in Computer Science.
Management of Computing and Information Systems.
author Deng, Robert. editor.
Bao, Feng. editor.
Zhou, Jianying. editor.
Qing, Sihan. editor.
SpringerLink (Online service)
author_facet Deng, Robert. editor.
Bao, Feng. editor.
Zhou, Jianying. editor.
Qing, Sihan. editor.
SpringerLink (Online service)
author_sort Deng, Robert. editor.
title Information and Communications Security [electronic resource] : 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings /
title_short Information and Communications Security [electronic resource] : 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings /
title_full Information and Communications Security [electronic resource] : 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings /
title_fullStr Information and Communications Security [electronic resource] : 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings /
title_full_unstemmed Information and Communications Security [electronic resource] : 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings /
title_sort information and communications security [electronic resource] : 4th international conference, icics 2002 singapore, december 9–12, 2002 proceedings /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 2002
url http://dx.doi.org/10.1007/3-540-36159-6
work_keys_str_mv AT dengroberteditor informationandcommunicationssecurityelectronicresource4thinternationalconferenceicics2002singaporedecember9122002proceedings
AT baofengeditor informationandcommunicationssecurityelectronicresource4thinternationalconferenceicics2002singaporedecember9122002proceedings
AT zhoujianyingeditor informationandcommunicationssecurityelectronicresource4thinternationalconferenceicics2002singaporedecember9122002proceedings
AT qingsihaneditor informationandcommunicationssecurityelectronicresource4thinternationalconferenceicics2002singaporedecember9122002proceedings
AT springerlinkonlineservice informationandcommunicationssecurityelectronicresource4thinternationalconferenceicics2002singaporedecember9122002proceedings
_version_ 1756268739011018752
spelling KOHA-OAI-TEST:2100222018-07-30T23:42:03ZInformation and Communications Security [electronic resource] : 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings / Deng, Robert. editor. Bao, Feng. editor. Zhou, Jianying. editor. Qing, Sihan. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,2002.engThis volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.System Security I -- Defenses against the Truncation of Computation Results of Free-Roaming Agents -- A Distributed Dynamic ?Firewall Architecture with Mobile Agents and KeyNote Trust Management System -- Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack -- An Evaluation of Different IP Traceback Approaches -- Security against Inference Attacks on Negative Information in Object-Oriented Databases -- Cryptosystem I -- Robust Key-Evolving Public Key Encryption Schemes -- A Group Signature Scheme Committing the Group -- Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions -- Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption -- Reducing the Memory Complexity of Type-Inference Algorithms -- Security Protocol I -- The Risks of Compromising Secret Information -- Password-Authenticated Key Exchange between Clients with Different Passwords -- Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction -- Attacking Predictable IPsec ESP Initialization Vectors -- Fingerprinting & Watermarking -- An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code -- A Robust Block Oriented Watermarking Scheme in Spatial Domain -- A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing -- Efficient Implementation of Algorithms -- Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fields -- Fast Elliptic Curve Multiplications with SIMD Operations -- Further Results on Multiples of Primitive Polynomials and Their Products over GF(2) -- System Security II -- A Secure Object Sharing Scheme for Java Card -- IDS Interoperability and Correlation Using IDMEF and Commodity Systems -- A Synthetic Fraud Data Generation Methodology -- User Interaction Design for Secure Systems -- Using Independent Auditors as Intrusion Detection Systems -- Cryptosystem II -- Cellular Automata Based Cryptosystem (CAC) -- New Weak-Key Classes of IDEA -- Risks with Raw-Key Masking — The Security Evaluation of 2-Key XCBC -- A New Statistical Testing for Symmetric Ciphers and Hash Functions -- Message Authentication Codes with Error Correcting Capabilities -- Access Control -- The Consistency of an Access Control List -- Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies -- A Specification Language for Distributed Policy Control -- Access Control Infrastructure for Digital Objects -- Security Protocol II -- Distributed Key Generation as a Component of an Integrated Protocol -- A Secure Agent-Mediated Payment Protocol -- Cryptanalysis & Cryptographic Techniques -- Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties -- Related-Cipher Attacks -- A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 -- Ideal Threshold Schemes from Orthogonal Arrays -- Cryptanalysis of the Reduced-Round RC6.This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.Computer science.Computer communication systems.Operating systems (Computers).Data encryption (Computer science).Computer scienceManagement information systems.Computer Science.Data Encryption.Computer Communication Networks.Operating Systems.Discrete Mathematics in Computer Science.Management of Computing and Information Systems.Springer eBookshttp://dx.doi.org/10.1007/3-540-36159-6URN:ISBN:9783540361596