Muutke küpsiste eelistusi

E-raamat: Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings

Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 2836
  • Ilmumisaeg: 02-Oct-2003
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540399278
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 2836
  • Ilmumisaeg: 02-Oct-2003
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540399278
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 1013 October 2003. Among the preceding conferences, ICICS97 was held in B- jing, China, ICICS99 in Sydney, Australia, ICICS 2001 in Xian, China, and ICICS 2002,in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conferences has been to o er the attendees the - portunity to discuss the state-of-the-art technology in theoretical and practical aspects of information and communications security. The response to the Call forPaperswassurprising.WhenwewerepreparingtheconferencebetweenApril and May, China, including the conference venue, Huhehaote City, was ?ghting against SARS. Despite this 176 papers were submitted to the conference from 22 countries and regions, and after a competitive selection process, 37 papers from 14 countries and regions were accepted to appear in the proceedings and be presented at ICICS 2003. We would like to take this opportunity to thank all those who submitted papers to ICICS 2003 for their valued contribution to the conference.

Muu info

Springer Book Archives
A Fast Square Root Computation Using the Frobenius Mapping
1(10)
Wang Feng
Yasuyuki Nogami
Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption
11(11)
Dang Nguyen Duc
Jung Hee Cheon
Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
22(12)
Yan Wang
Chi-Hung Chi
Tieyan Li
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST
34(13)
Duncan S. Wong
Karyin Fung
Joseph K. Liu
Victor K. Wei
A Policy Based Framework for Access Control
47(13)
Ricardo Nabhen
Edgard Jamhour
Carlos Maziero
Trading-Off Type-Inference Memory Complexity against Communication
60(12)
Konstantin Hypponen
David Naccache
Elena Trichina
Alexei Tchoulkine
Security Remarks on a Group Signature Scheme with Member Deletion
72(12)
Guilin Wong
Feng Bao
Jianying Zhou
Robert H. Deng
An Efficient Known Plaintext Attack on FEA-M
84(4)
Hongjun Wu
Feng Bao
Robert H. Deng
An Efficient Public-Key Framework
88(12)
Jianying Zhou
Feng Bao
Robert Deng
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature
100(12)
Jong-Phil Yang
Chul Sur
Kyung Hyune Rhee
Practical Service Charge for P2P Content Distribution
112(12)
Jose Antonio Onieva
Jianying Zhou
Javier Lopez
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback
124(12)
Henry C.J. Lee
Vrizlynn L.L. Thing
Yi Xu
Miao Ma
A Lattice Based General Blind Watermark Scheme
136(9)
Yongliang Liu
Wen Gao
Zhao Wang
Shaohui Liu
Role-Based Access Control and the Access Control Matrix
145(13)
Gregory Saunders
Michael Hitchens
Vijay Varadharajan
Broadcast Encryption Schemes Based on the Sectioned Key Tree
158(12)
Miodrag J. Mihaljevic
Research on the Collusion Estimation
170(9)
Gang Li
Jie Yang
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains
179(12)
Mohsen Ashourian
Yo-Sung Ho
Protocols for Malicious Host Revocation
191(11)
Oscar Esparza
Miguel Soriano
Jose L. Munoz
Jordi Forne
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code
202(12)
Pik-Wah Chan
Michael R. Lyu
A Novel Two-Level Trust Model for Grid
214(12)
Tie-Yan Li
HuaFei Zhu
Kwok-Yan Lam
Practical t-out-n Oblivious Transfer and Its Applications
226(12)
Qian-Hong Wu
Jian-Hong Zhang
Yu-Min Wang
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
238(11)
Yongdong Wu
Robert Deng
ID-Based Distributed ``Magic Ink'' Signature from Pairings
249(11)
Yan Xie
Fangguo Zhang
Xiaofeng Chen
Kwangjo Kim
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature
260(9)
Yan Wang
Shuwang Lu
Zhenhua Liu
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives
269(11)
Yang Cui
Kazukuni Kobara
Hideki Imai
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems
280(12)
Xiao-dong Yi
Xue-jun Yang
A Novel Efficient Group Signature Scheme with Forward Security
292(9)
Jianhong Zhang
Qianhong Wu
Yumin Wang
Variations of Diffie-Hellman Problem
301(12)
Feng Bao
Robert H. Deng
HuaFei Zhu
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine
313(12)
Taeshik Sohn
JungTaek Seo
Jongsub Moon
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine
325(12)
Min Luo
Lina Wang
Huanguo Zhang
Jin Chen
UC-RBAC: A Usage Constrained Role-Based Access Control Model
337(11)
Zhen Xu
Dengguo Feng
Lan Li
Hua Chen
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography
348(12)
Mathieu Ciet
Marc Joye
An Optimized Multi-bits Blind Watermarking Scheme
360(10)
Xiaoqiang Li
Xiangyang Xue
Wei Li
A Compound Intrusion Detection Model
370(12)
Jianhua Sun
Hai Jin
Hao Chen
Qian Zhang
Zongfen Han
An Efficient Convertible Authenticated Encryption Scheme and Its Variant
382(11)
Hui-Feng Huang
Chin-Chen Chang
Space-Economical Reassembly for Intrusion Detection System
393(12)
Meng Zhang
Jiu-bin Ju
A Functional Decomposition of Virus and Worm Programs
405(10)
J. Krishna Murthy
Author Index 415