Information and Communications Security [electronic resource] : 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 Proceedings / edited by Miguel Soriano, Sihan Qing, Javier López.

Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
1 online resource (XIV, 474 pages) : 120 illustrations
1st ed. 2010.
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology SL 4, 6476
Security and Cryptology ; 6476
Contained In:
Springer eBooks

Location Notes Your Loan Policy


Computer security.
Data encryption (Computer science).
Data structures (Computer science).
Coding theory.
Information theory.
Computer networks.
Local subjects:
Systems and Data Security. (search)
Cryptology. (search)
Data Structures and Information Theory. (search)
Coding and Information Theory. (search)
Algorithm Analysis and Problem Complexity. (search)
Computer Communication Networks. (search)
System Details:
text file PDF
Cryptographic Hash Functions: Theory and Practice
Cryptographic Hash Functions: Theory and Practice
Session 1A. Access Control
Rewriting of SPARQL/Update Queries for Securing Data Access
Fine-Grained Disclosure of Access Policies
Session 1B. Public Key Cryptography and Cryptanalysis
Manger's Attack Revisited
Horizontal Correlation Analysis on Exponentiation
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Session 1C. Security in Distributed and Mobile Systems
A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms
Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Session 1D. Cryptanalysis
On Practical Second-Order Power Analysis Attacks for Block Ciphers
Consecutive S-box Lookups: A Timing Attack on SNOW 3G
Session 2A. Authentication
Efficient Authentication for Mobile and Pervasive Computing
Security Enhancement and Modular Treatment towards Authenticated Key Exchange
Federated Secret Handshakes with Support for Revocation
Session 2B. Fair Exchange Protocols
An Agent-Mediated Fair Exchange Protocol
A New Method for Formalizing Optimistic Fair Exchange Protocols
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
Session 2C. Anonymity and Privacy
Proving Coercion-Resistance of Scantegrity II
Anonymity and Verifiability in Voting: Understanding (Un)Linkability
A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms
Time Warp: How Time Affects Privacy in LBSs
Session 2D. Software Security
Return-Oriented Rootkit without Returns (on the x86)
Experimental Threat Model Reuse with Misuse Case Diagrams
Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis
Session 3A. Proxy Cryptosystems
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
Ciphertext Policy Attribute-Based Proxy Re-encryption
Session 3B. Intrusion Detection Systems
Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks
A Trust-Based IDS for the AODV Protocol
IDS Alert Visualization and Monitoring through Heuristic Host Selection
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Soriano, Miguel. editor., Editor,
Qing, Sihan. editor., Editor,
López, Javier. editor., Editor,
SpringerLink (Online service)
Other format:
Printed edition:
Printed edition:
Publisher Number:
10.1007/978-3-642-17650-0 doi
Access Restriction:
Restricted for use by site license.