This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2001, held in Malaga, Spain in October 2004.The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection.
作者簡介
暫缺《信息安全Information security》作者簡介
圖書目錄
Key Distribution Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures Privacy Amplification Theorem for Noisy Main Channel Protocols Efficient Kerberized Multicast in a Practical Distributed Setting Suitability of a Classical Analysis Method for E-commerce Protocols Enhancing Technologies Hyppocrates (A New Proactive Password Checker) Lenient/Strict Batch Verification in Several Groups Privacy Absolute Privacy in Voting Johann-Christoph Freytag (Humboldt-Universitiit zu Berlin) A Logical Model for Privacy Protection Stanley Chow, Yuan Gu, Harold Johnson ( Cloakware Corporation), Message Hiding I A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography Robust New Method in Frequency Domain Watermarking PKI Issues and Protocols On the Complexity of Public-Key Certificate Validation Liability of Certification Authorities: A Juridical Point of View Hardware Implementations Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board Elliptic Curve Arithmetic Using SIMD …… Cryptanalysis and aPrevention Implementaivns Non-repudiation Techniqnes Contrasfs and Anctions Message HidingII Paytrents Security APpliications Network and OS Security Author Index