ICICS C

43 papers

YearTitle / Authors
2004A New Key-Insulated Signature Scheme.
Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio
2004A Qualitative Evaluation of Security Patterns.
Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides
2004A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.
Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels
2004A Semi-fragile Steganographic Digital Signature for Images.
Luke Hebbes, Andrew P. Lenaghan
2004Adaptive-CCA on OpenPGP Revisited.
Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen
2004An Efficient Authentication Scheme Using Recovery Information in Signature.
Kihun Hong, Souhwan Jung
2004Automatic Covert Channel Analysis of a Multilevel Secure Component.
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci
2004Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario.
Slobodan Petrovic, Amparo Fúster-Sabater
2004Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro
2004Dynamic Access Control for Multi-privileged Group Communications.
Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li
2004Factorization-Based Fail-Stop Signatures Revisited.
Katja Schmidt-Samoa
2004Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
2004Hydan: Hiding Information in Program Binaries.
Rakan El-Khalil, Angelos D. Keromytis
2004Identification of Traitors Using a Trellis.
Marcel Fernandez, Miguel Soriano
2004Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings
Javier López, Sihan Qing, Eiji Okamoto
2004Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, Volker Roth
2004Modelling Dependencies Between Classifiers in Mobile Masquerader Detection.
Oleksiy Mazhelis, Seppo Puuronen, Jari Veijalainen
2004Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
2004Multi-designated Verifiers Signatures.
Fabien Laguillaumie, Damien Vergnaud
2004New Identity-Based Ring Signature Schemes.
Javier Herranz, Germán Sáez
2004New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm.
Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee
2004On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
Bo-Yin Yang, Jiun-Ming Chen, Nicolas T. Courtois
2004On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks.
Anton Kargl, Götz Wiesend
2004On Some Weak Extensions of AES and BES.
Jean Monnerat, Serge Vaudenay
2004On the Minimal Assumptions of Group Signature Schemes.
Michel Abdalla, Bogdan Warinschi
2004On the Security of a Multi-party Certified Email Protocol.
Jianying Zhou
2004PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks.
Klaus Herrmann, Michael A. Jaeger
2004Perfect Concurrent Signature Schemes.
Willy Susilo, Yi Mu, Fangguo Zhang
2004Provably Secure Authenticated Tree Based Group Key Agreement.
Ratna Dutta, Rana Barua, Palash Sarkar
2004Reflector Attack Traceback System with Pushback Based iTrace Mechanism.
Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh
2004Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
Habtamu Abie, Pål Spilling, Bent Foyn
2004Robust Metering Schemes for General Access Structures.
Ventzislav Nikov, Svetla Nikova, Bart Preneel
2004Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.
Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
2004Secure Hierarchical Identity Based Signature and Its Application.
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow
2004Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV).
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
2004Security Analysis of the Generalized Self-shrinking Generator.
Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
2004Sound Approximations to Diffie-Hellman Using Rewrite Rules.
Christopher Lynch, Catherine Meadows
2004Taxonomic Consideration to OAEP Variants and Their Security.
Yuichi Komano, Kazuo Ohta
2004Threat Analysis on NEtwork MObility (NEMO).
Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, Hyungon Kim
2004Time-Scoped Searching of Encrypted Audit Logs.
Darren Davis, Fabian Monrose, Michael K. Reiter
2004Transient Fault Induction Attacks on XTR.
Mathieu Ciet, Christophe Giraud
2004Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.
Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara
2004Volatile Memory Computer Forensics to Detect Kernel Level Compromise.
Sandra Ring, Eric Cole