


default search action
4. ICICS 2002: Singapore
- Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou:
Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings. Lecture Notes in Computer Science 2513, Springer 2002, ISBN 3-540-00164-6
System Security I
- Jeff S. L. Cheng, Victor K. Wei:
Defenses against the Truncation of Computation Results of Free-Roaming Agents. 1-12 - Hai Jin, Feng Xian, Zongfen Han, Shengli Li:
A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System. 13-24 - Changwoo Pyo, Gyungho Lee:
Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack. 25-36 - Vadim Kuznetsov, Helena Sandström, Andrei Simkin:
An Evaluation of Different IP Traceback Approaches. 37-48 - Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara:
Security against Inference Attacks on Negative Information in Object-Oriented Databases. 49-60
Cryptosystem I
- Wen-Guey Tzeng, Zhi-Jia Tzeng:
Robust Key-Evolving Public Key Encryption Schemes. 61-72 - Toru Nakanishi, Masayuki Tao, Yuji Sugiyama:
A Group Signature Scheme Committing the Group. 73-84 - Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. 85-96 - Myungsun Kim, Jongseong Kim, Kwangjo Kim:
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. 97-108 - David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina:
Reducing the Memory Complexity of Type-Inference Algorithms. 109-121
Security Protocol I
- Kyungah Shim:
The Risks of Compromising Secret Information. 122-133 - Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park:
Password-Authenticated Key Exchange between Clients with Different Passwords. 134-146 - Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. 147-159 - Sami Vaarala, Antti Nuopponen, Teemupekka Virtanen:
Attacking Predictable IPsec ESP Initialization Vectors. 160-172
Fingerprinting & Watermaking
- Hajime Watanabe, Takashi Kitagawa:
An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. 173-183 - Tanmoy Kanti Das, Subhamoy Maitra:
A Robust Block Oriented Watermarking Scheme in Spatial Domain. 184-196 - Tatsuyuki Matsushita:
A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing. 197-208
Efficient Implementation of Algorithms
- Soonhak Kwon:
Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fields. 209-216 - Tetsuya Izu, Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations. 217-230 - Ayineedi Venkateswarlu, Subhamoy Maitra:
Further Results on Multiples of Primitive Polynomials and Their Products over GF(2). 231-242
System Security II
- Junqi Zhang, Vijay Varadharajan, Yi Mu:
A Secure Object Sharing Scheme for Java Card. 243-251 - Nathan Carey, Andrew J. Clark, George M. Mohay:
IDS Interoperability and Correlation Using IDMEF and Commodity Systems. 252-264 - Emilie Lundin, Håkan Kvarnström, Erland Jonsson:
A Synthetic Fraud Data Generation Methodology. 265-277 - Ka-Ping Yee:
User Interaction Design for Secure Systems. 278-290 - Jesus Molina, William A. Arbaugh:
Using Independent Auditors as Intrusion Detection Systems. 291-302
Cryptosystems II
- Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri:
Cellular Automata Based Cryptosystem (CAC). 303-314 - Alex Biryukov
, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
New Weak-Key Classes of IDEA. 315-326 - Soichi Furuya, Kouichi Sakurai:
Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. 327-341 - Eric Filiol
:
A New Statistical Testing for Symmetric Ciphers and Hash Functions. 342-353 - Charles C. Y. Lam, Guang Gong, Scott A. Vanstone:
Message Authentication Codes with Error Correcting Capabilities. 354-366
Access Control
- Shoupeng Li, Shizhong Wu, Tao Guo:
The Consistency of an Access Control List. 367-373 - Jong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim:
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies. 374-385 - Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki:
A Specification Language for Distributed Policy Control. 386-398 - Javier López, Antonio Mana
, Ernesto Pimentel
, José M. Troya, Mariemma Inmaculada Yagüe del Valle:
Access Control Infrastructure for Digital Objects. 399-410
Security Protocol II
- Cheng-Kang Chu, Wen-Guey Tzeng:
Distributed Key Generation as a Component of an Integrated Protocol. 411-421 - Xiaolin Pang, Kian-Lee Tan
, Yan Wang, Jian Ren:
A Secure Agent-Mediated Payment Protocol. 422-433
Cryptanalysis & Cryptographic Techniques
- Alexander Kholosha, Henk C. A. van Tilborg:
Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties. 434-446 - Hongjun Wu:
Related-Cipher Attacks. 447-455 - Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim:
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. 456-468 - Josef Pieprzyk
, Xian-Mo Zhang:
Ideal Threshold Schemes from Orthogonal Arrays. 469-479 - Atsuko Miyaji
, Masao Nonaka:
Cryptanalysis of the Reduced-Round RC6. 480-494

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.