The Resource Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings, Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)

Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings, Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)

Label
Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
Title
Information and communications security
Title remainder
Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
Statement of responsibility
Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
DLC
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I554 2001
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2001
http://bibfra.me/vocab/lite/meetingName
ICICS (Conference)
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Qing, Sihan
  • Okamoto, Tatsuaki
  • Zhou, Jianying
http://library.link/vocab/subjectName
  • Computer security
  • Telecommunication systems
  • sécurité réseau
  • signature numérique
  • cryptographie
  • sécurité communication
  • sécurité information
  • Systèmes informatiques
  • Télécommunications, Systèmes de
  • Databescherming
  • Communicatiesystemen
  • Kongreß
  • Kryptologie
  • Systèmes de télécommunications
  • Systèmes informatiques
  • Protection de l'information (informatique)
  • Computer security
  • Telecommunication systems
Label
Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings, Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Security of Blind Discrete Log Signatures against Interactive Attacks / Claus Peter Schnorr -- An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu and Yingcai Bai -- Primitive Polynomials over GF(2) -- A Cryptologic Approach / Kishan Chand Gupta and Subhamoy Maitra -- Unconditionally-Secure Oblivious Transfer / Bo Yang, Shixiong Zhu and Yumin Wang -- Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang and Iuon-Chang Lin -- Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Chin-Chen Chang and Kuo-Feng Hwang -- Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo, Lincheng Shen and Wensen Chang -- A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki, Fumitaka Hoshino and Tetsutaro Kobayashi -- Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang, Futai Zhang and Yumin Wang -- Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye, Junhui Yang and Zongduo Dai / [et al.] -- A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura -- A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim -- A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim, Hae-Kyung Rhee and Tai M. Chung / [et al.] -- Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho and Zbigniew Ciechanowncz -- RBAC for XML Document Stores / Michael Hitchens and Vijay Varadharajan -- Cheating Immune Secret Sharing / Xian-Mo Zhang and Josef Pieprzyk -- Encryption Sticks (Randomats) / Gideon Samid -- Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song and Sihan Qing -- Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono and Ingo Liebhardt -- Enforcing Obligation with Security Monitors / Carlos Ribeiro, Andre Zuquete and Paulo Ferreira -- Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning and Yiqun Lisa Yin -- Playing Lottery on the Internet / Jianying Zhou and Chunfu Tan -- Privacy Protection for Transaction of Digital Goods / Feng Bao and Robert Deng -- Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lu Xu, Han-liang Xu and Yan Wang / [et al.] -- Threshold Undeniable RSA Signature Scheme / Guilin Wang, Sihan Qing and Mingsheng Wang / [et al.] -- Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang, Cheng-Chi Lee and Yuan-Liang Tang -- Square Attack on Reduced Camellia Cipher / Yeping He and Sihan Qing -- Generalization of Elliptic Curve Digital Signature Schemes / Lin You, Yi Xian Yang and Chun Qi Zhang -- Reasoning about Accountability within Delegation / Bruno Crispo and Giancarlo Ruffo -- A Novel Data Hiding Method for Two-Color Images / Gang Pan, Yijun Wu and Zhaohui Wu -- An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee, X. Deng and H. Zhu -- Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari -- An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu, Yoshiaki Takato and Hiroyuki Seki / [et al.] -- Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye -- A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang, Harald Lukhaub and Werner Zorn -- A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp and Chaiwat Rujimethabhas -- Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen, Adam Bargteil and David Bindel / [et al.] -- A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto, Colin Boyd and Ed Dawson -- On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong and Chul Kim -- NIDS Research Based on Artificial Immunology / Wenjian Luo, Xianbin Cao and Xufa Wang -- AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Canovas and Antonio F. Gomez -- Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou, Byrav Ramamurthy and Spyros S. Magliveras -- Dispatching Mobile Agents with Secure Routes in Parallel / Yan Wang and Kian-Lee Tan -- TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen, Qian Fang and Zhihui Du / [et al.] -- Cryptography and Middleware Security / Ulrich Lang, Dieter Gollmann and Rudolf Schreiner -- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng, Chung-Huang Yang and T. R. N. Rao -- A Role-Based Model for Access Control in Database Federations / Eric Disson, Danielle Boulanger and Gilles Dubois -- A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li, Lianli Chang and Xinmei Wang -- A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park and Im-Yeong Lee -- Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi and Tae Ho Cho -- Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland and Colin Boyd -- Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu and Vijay Varadharajan -- SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park, Jang-Se Lee and Hwan Kuk Kim / [et al.] -- A New Semantics of Authentication Logic / Yifa Li -- Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park, Sook Ee Jeong and Chang Soo Kim -- Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram
Dimensions
24 cm.
Dimensions
unknown
Extent
xiv, 504 pages
Isbn
9783540428800
Lccn
2001057579
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)48449699
  • (OCoLC)ocm48449699
Label
Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings, Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Security of Blind Discrete Log Signatures against Interactive Attacks / Claus Peter Schnorr -- An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu and Yingcai Bai -- Primitive Polynomials over GF(2) -- A Cryptologic Approach / Kishan Chand Gupta and Subhamoy Maitra -- Unconditionally-Secure Oblivious Transfer / Bo Yang, Shixiong Zhu and Yumin Wang -- Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang and Iuon-Chang Lin -- Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Chin-Chen Chang and Kuo-Feng Hwang -- Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo, Lincheng Shen and Wensen Chang -- A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki, Fumitaka Hoshino and Tetsutaro Kobayashi -- Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang, Futai Zhang and Yumin Wang -- Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye, Junhui Yang and Zongduo Dai / [et al.] -- A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura -- A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim -- A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim, Hae-Kyung Rhee and Tai M. Chung / [et al.] -- Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho and Zbigniew Ciechanowncz -- RBAC for XML Document Stores / Michael Hitchens and Vijay Varadharajan -- Cheating Immune Secret Sharing / Xian-Mo Zhang and Josef Pieprzyk -- Encryption Sticks (Randomats) / Gideon Samid -- Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song and Sihan Qing -- Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono and Ingo Liebhardt -- Enforcing Obligation with Security Monitors / Carlos Ribeiro, Andre Zuquete and Paulo Ferreira -- Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning and Yiqun Lisa Yin -- Playing Lottery on the Internet / Jianying Zhou and Chunfu Tan -- Privacy Protection for Transaction of Digital Goods / Feng Bao and Robert Deng -- Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lu Xu, Han-liang Xu and Yan Wang / [et al.] -- Threshold Undeniable RSA Signature Scheme / Guilin Wang, Sihan Qing and Mingsheng Wang / [et al.] -- Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang, Cheng-Chi Lee and Yuan-Liang Tang -- Square Attack on Reduced Camellia Cipher / Yeping He and Sihan Qing -- Generalization of Elliptic Curve Digital Signature Schemes / Lin You, Yi Xian Yang and Chun Qi Zhang -- Reasoning about Accountability within Delegation / Bruno Crispo and Giancarlo Ruffo -- A Novel Data Hiding Method for Two-Color Images / Gang Pan, Yijun Wu and Zhaohui Wu -- An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee, X. Deng and H. Zhu -- Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari -- An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu, Yoshiaki Takato and Hiroyuki Seki / [et al.] -- Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye -- A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang, Harald Lukhaub and Werner Zorn -- A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp and Chaiwat Rujimethabhas -- Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen, Adam Bargteil and David Bindel / [et al.] -- A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto, Colin Boyd and Ed Dawson -- On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong and Chul Kim -- NIDS Research Based on Artificial Immunology / Wenjian Luo, Xianbin Cao and Xufa Wang -- AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Canovas and Antonio F. Gomez -- Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou, Byrav Ramamurthy and Spyros S. Magliveras -- Dispatching Mobile Agents with Secure Routes in Parallel / Yan Wang and Kian-Lee Tan -- TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen, Qian Fang and Zhihui Du / [et al.] -- Cryptography and Middleware Security / Ulrich Lang, Dieter Gollmann and Rudolf Schreiner -- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng, Chung-Huang Yang and T. R. N. Rao -- A Role-Based Model for Access Control in Database Federations / Eric Disson, Danielle Boulanger and Gilles Dubois -- A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li, Lianli Chang and Xinmei Wang -- A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park and Im-Yeong Lee -- Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi and Tae Ho Cho -- Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland and Colin Boyd -- Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu and Vijay Varadharajan -- SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park, Jang-Se Lee and Hwan Kuk Kim / [et al.] -- A New Semantics of Authentication Logic / Yifa Li -- Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park, Sook Ee Jeong and Chang Soo Kim -- Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram
Dimensions
24 cm.
Dimensions
unknown
Extent
xiv, 504 pages
Isbn
9783540428800
Lccn
2001057579
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)48449699
  • (OCoLC)ocm48449699

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...