ICICS C

38 papers

YearTitle / Authors
2008Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings
Sihan Qing, Hideki Imai, Guilin Wang
2007(Convertible) Undeniable Signatures Without Random Oracles.
Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
2007A Framework for Game-Based Security Proofs.
David Nowak
2007A New Dynamic Accumulator for Batch Updates.
Peishun Wang, Huaxiong Wang, Josef Pieprzyk
2007A Novel Approach for Untrusted Code Execution.
Yan Wen, Jinjing Zhao, Huaimin Wang
2007A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction.
B. John Oommen, Ebaa Fayyoumi
2007A Semi-blind Watermarking Based on Discrete Wavelet Transform.
Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu
2007A System Architecture for History-Based Access Control for XML Documents.
Patrick Röder, Omid Tafreschi, Fredrik Mellgren, Claudia Eckert
2007An Efficient Password-Only Two-Server Authenticated Key Exchange System.
Haimin Jin, Duncan S. Wong, Yinlong Xu
2007Application of the PageRank Algorithm to Alarm Graphs.
James J. Treinen, Ramakrishna Thurimella
2007Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard.
Jiqiang Lu
2007Audio Watermarking Algorithm Based on Centroid and Statistical Features.
Xiaoming Zhang, Xiong Yin
2007Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis
2007BIOS Security Analysis and a Kind of Trusted BIOS.
Zhenliu Zhou, Rongsheng Xu
2007Boudot's Range-Bounded Commitment Scheme Revisited.
Zhengjun Cao, Lihua Liu
2007Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
2007Compact and Secure Design of Masked AES S-Box.
Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani
2007DDoS Attack Detection Algorithms Based on Entropy Computing.
Liying Li, Jianying Zhou, Ning Xiao
2007Detection and Diagnosis of Control Interception.
Chang-Hsien Tsai, Shih-Kun Huang
2007Differential Fault Analysis on CLEFIA.
Hua Chen, Wenling Wu, Dengguo Feng
2007Drive-By Pharming.
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
2007Extending FORK-256 Attack to the Full Hash Function.
Scott Contini, Krystian Matusiewicz, Josef Pieprzyk
2007Firewall for Dynamic IP Address in Mobile IPv6.
Ying Qiu, Feng Bao, Jianying Zhou
2007Formal Definition and Construction of Nominative Signature.
Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
2007High Speed Modular Divider Based on GCD Algorithm.
Abdulah Abdulah Zadeh
2007MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.
Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li
2007Modeling Agreement Problems in the Universal Composability Framework.
Masayuki Terada, Kazuki Yoneyama, Sadayuki Hongo, Kazuo Ohta
2007New Construction of Group Secret Handshakes Based on Pairings.
Lan Zhou, Willy Susilo, Yi Mu
2007On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme.
Qianli Zhang, Jilong Wang, Xing Li
2007Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.
Mooseop Kim, JaeCheol Ryou
2007Preventing Unofficial Information Propagation.
Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon
2007Privacy Protection on Multiple Sensitive Attributes.
Zhen Li, Xiaojun Ye
2007Secure Multiparty Computation of DNF.
Kun Peng
2007Short Group Signature Without Random Oracles.
Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
2007Square Like Attack on Camellia.
Duo Lei, Chao Li, Keqin Feng
2007Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures.
Charalampos Papamanthou, Roberto Tamassia
2007Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.
Rui Xue, Dengguo Feng
2007What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security.
Xiaowei Huang, Li Jiao, Weiming Lu