
Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings Author: Javier Lopez, Sihan Qing, Eiji Okamoto Published by Springer Berlin Heidelberg ISBN: 978-3-540-23563-7 DOI: 10.1007/b101042 Table of Contents: On the Minimal Assumptions of Group Signature Schemes Perfect Concurrent Signature Schemes New Identity-Based Ring Signature Schemes On the Security of a Multi-party Certified Email Protocol Robust Metering Schemes for General Access Structures PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN Provably Secure Authenticated Tree Based Group Key Agreement Taxonomic Consideration to OAEP Variants and Their Security Factorization-Based Fail-Stop Signatures Revisited A Qualitative Evaluation of Security Patterns Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases Volatile Memory Computer Forensics to Detect Kernel Level Compromise A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet Hydan: Hiding Information in Program Binaries A Semi-fragile Steganographic Digital Signature for Images Identification of Traitors Using a Trellis Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation Reflector Attack Traceback System with Pushback Based iTrace Mechanism Automatic Covert Channel Analysis of a Multilevel Secure Component
Page Count:
564
Publication Date:
2004-01-01
No comments yet. Be the first to share your thoughts!