Coverart for item
The Resource Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings, Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)

Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings, Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)

Label
Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
Title
Information and communications security
Title remainder
Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
Statement of responsibility
Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
Title variation
ICICS 2001
Creator
Contributor
Subject
Genre
Language
eng
Member of
Additional physical form
Also available via the World Wide Web.
Cataloging source
DLC
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I554 2001
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2001
http://bibfra.me/vocab/lite/meetingName
ICICS (Conference)
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Qing, Sihan
  • Okamoto, Tatsuaki
  • Zhou, Jianying
Series statement
Lecture notes in computer science
Series volume
2229
http://library.link/vocab/subjectName
  • Computer security
  • Telecommunication systems
Label
Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings, Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Security of Blind Discrete Log Signatures against Interactive Attacks / Claus Peter Schnorr -- An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu and Yingcai Bai -- Primitive Polynomials over GF(2) -- A Cryptologic Approach / Kishan Chand Gupta and Subhamoy Maitra -- Unconditionally-Secure Oblivious Transfer / Bo Yang, Shixiong Zhu and Yumin Wang -- Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang and Iuon-Chang Lin -- Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Chin-Chen Chang and Kuo-Feng Hwang -- Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo, Lincheng Shen and Wensen Chang -- A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki, Fumitaka Hoshino and Tetsutaro Kobayashi -- Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang, Futai Zhang and Yumin Wang -- Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye, Junhui Yang and Zongduo Dai / [et al.] -- A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura -- A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim -- A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim, Hae-Kyung Rhee and Tai M. Chung / [et al.] -- Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho and Zbigniew Ciechanowncz -- RBAC for XML Document Stores / Michael Hitchens and Vijay Varadharajan -- Cheating Immune Secret Sharing / Xian-Mo Zhang and Josef Pieprzyk -- Encryption Sticks (Randomats) / Gideon Samid -- Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song and Sihan Qing -- Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono and Ingo Liebhardt -- Enforcing Obligation with Security Monitors / Carlos Ribeiro, Andre Zuquete and Paulo Ferreira -- Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning and Yiqun Lisa Yin -- Playing Lottery on the Internet / Jianying Zhou and Chunfu Tan -- Privacy Protection for Transaction of Digital Goods / Feng Bao and Robert Deng -- Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lu Xu, Han-liang Xu and Yan Wang / [et al.] -- Threshold Undeniable RSA Signature Scheme / Guilin Wang, Sihan Qing and Mingsheng Wang / [et al.] -- Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang, Cheng-Chi Lee and Yuan-Liang Tang -- Square Attack on Reduced Camellia Cipher / Yeping He and Sihan Qing -- Generalization of Elliptic Curve Digital Signature Schemes / Lin You, Yi Xian Yang and Chun Qi Zhang -- Reasoning about Accountability within Delegation / Bruno Crispo and Giancarlo Ruffo -- A Novel Data Hiding Method for Two-Color Images / Gang Pan, Yijun Wu and Zhaohui Wu -- An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee, X. Deng and H. Zhu -- Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari -- An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu, Yoshiaki Takato and Hiroyuki Seki / [et al.] -- Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye -- A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang, Harald Lukhaub and Werner Zorn -- A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp and Chaiwat Rujimethabhas -- Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen, Adam Bargteil and David Bindel / [et al.] -- A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto, Colin Boyd and Ed Dawson -- On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong and Chul Kim -- NIDS Research Based on Artificial Immunology / Wenjian Luo, Xianbin Cao and Xufa Wang -- AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Canovas and Antonio F. Gomez -- Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou, Byrav Ramamurthy and Spyros S. Magliveras -- Dispatching Mobile Agents with Secure Routes in Parallel / Yan Wang and Kian-Lee Tan -- TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen, Qian Fang and Zhihui Du / [et al.] -- Cryptography and Middleware Security / Ulrich Lang, Dieter Gollmann and Rudolf Schreiner -- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng, Chung-Huang Yang and T. R. N. Rao -- A Role-Based Model for Access Control in Database Federations / Eric Disson, Danielle Boulanger and Gilles Dubois -- A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li, Lianli Chang and Xinmei Wang -- A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park and Im-Yeong Lee -- Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi and Tae Ho Cho -- Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland and Colin Boyd -- Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu and Vijay Varadharajan -- SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park, Jang-Se Lee and Hwan Kuk Kim / [et al.] -- A New Semantics of Authentication Logic / Yifa Li -- Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park, Sook Ee Jeong and Chang Soo Kim -- Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram
Control code
48449699
Dimensions
24 cm
Dimensions
unknown
Extent
xiv, 504 pages
Isbn
9783540428800
Isbn Type
(softcover : alk. paper)
Lccn
2001057579
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote
Label
Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings, Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Security of Blind Discrete Log Signatures against Interactive Attacks / Claus Peter Schnorr -- An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu and Yingcai Bai -- Primitive Polynomials over GF(2) -- A Cryptologic Approach / Kishan Chand Gupta and Subhamoy Maitra -- Unconditionally-Secure Oblivious Transfer / Bo Yang, Shixiong Zhu and Yumin Wang -- Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang and Iuon-Chang Lin -- Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Chin-Chen Chang and Kuo-Feng Hwang -- Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo, Lincheng Shen and Wensen Chang -- A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki, Fumitaka Hoshino and Tetsutaro Kobayashi -- Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang, Futai Zhang and Yumin Wang -- Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye, Junhui Yang and Zongduo Dai / [et al.] -- A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura -- A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim -- A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim, Hae-Kyung Rhee and Tai M. Chung / [et al.] -- Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho and Zbigniew Ciechanowncz -- RBAC for XML Document Stores / Michael Hitchens and Vijay Varadharajan -- Cheating Immune Secret Sharing / Xian-Mo Zhang and Josef Pieprzyk -- Encryption Sticks (Randomats) / Gideon Samid -- Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song and Sihan Qing -- Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono and Ingo Liebhardt -- Enforcing Obligation with Security Monitors / Carlos Ribeiro, Andre Zuquete and Paulo Ferreira -- Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning and Yiqun Lisa Yin -- Playing Lottery on the Internet / Jianying Zhou and Chunfu Tan -- Privacy Protection for Transaction of Digital Goods / Feng Bao and Robert Deng -- Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lu Xu, Han-liang Xu and Yan Wang / [et al.] -- Threshold Undeniable RSA Signature Scheme / Guilin Wang, Sihan Qing and Mingsheng Wang / [et al.] -- Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang, Cheng-Chi Lee and Yuan-Liang Tang -- Square Attack on Reduced Camellia Cipher / Yeping He and Sihan Qing -- Generalization of Elliptic Curve Digital Signature Schemes / Lin You, Yi Xian Yang and Chun Qi Zhang -- Reasoning about Accountability within Delegation / Bruno Crispo and Giancarlo Ruffo -- A Novel Data Hiding Method for Two-Color Images / Gang Pan, Yijun Wu and Zhaohui Wu -- An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee, X. Deng and H. Zhu -- Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari -- An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu, Yoshiaki Takato and Hiroyuki Seki / [et al.] -- Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye -- A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang, Harald Lukhaub and Werner Zorn -- A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp and Chaiwat Rujimethabhas -- Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen, Adam Bargteil and David Bindel / [et al.] -- A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto, Colin Boyd and Ed Dawson -- On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong and Chul Kim -- NIDS Research Based on Artificial Immunology / Wenjian Luo, Xianbin Cao and Xufa Wang -- AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Canovas and Antonio F. Gomez -- Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou, Byrav Ramamurthy and Spyros S. Magliveras -- Dispatching Mobile Agents with Secure Routes in Parallel / Yan Wang and Kian-Lee Tan -- TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen, Qian Fang and Zhihui Du / [et al.] -- Cryptography and Middleware Security / Ulrich Lang, Dieter Gollmann and Rudolf Schreiner -- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng, Chung-Huang Yang and T. R. N. Rao -- A Role-Based Model for Access Control in Database Federations / Eric Disson, Danielle Boulanger and Gilles Dubois -- A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li, Lianli Chang and Xinmei Wang -- A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park and Im-Yeong Lee -- Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi and Tae Ho Cho -- Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland and Colin Boyd -- Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu and Vijay Varadharajan -- SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park, Jang-Se Lee and Hwan Kuk Kim / [et al.] -- A New Semantics of Authentication Logic / Yifa Li -- Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park, Sook Ee Jeong and Chang Soo Kim -- Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram
Control code
48449699
Dimensions
24 cm
Dimensions
unknown
Extent
xiv, 504 pages
Isbn
9783540428800
Isbn Type
(softcover : alk. paper)
Lccn
2001057579
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote

Library Locations

    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
    • University of Missouri Libraries DepositoryBorrow it
      2908 Lemone Blvd, Columbia, MO, 65211, US
      38.919360 -92.291620
Processing Feedback ...