000 05359nam a22005895i 4500
001 978-3-642-17650-0
003 DE-He213
005 20140220084551.0
007 cr nn 008mamaa
008 101206s2010 gw | s |||| 0|eng d
020 _a9783642176500
_9978-3-642-17650-0
024 7 _a10.1007/978-3-642-17650-0
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aSoriano, Miguel.
_eeditor.
245 1 0 _aInformation and Communications Security
_h[electronic resource] :
_b12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings /
_cedited by Miguel Soriano, Sihan Qing, Javier López.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXIV, 474p. 120 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6476
505 0 _aCryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory and Practice -- Session 1A. Access Control -- Rewriting of SPARQL/Update Queries for Securing Data Access -- Fine-Grained Disclosure of Access Policies -- Session 1B. Public Key Cryptography and Cryptanalysis -- Manger’s Attack Revisited -- Horizontal Correlation Analysis on Exponentiation -- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts -- Session 1C. Security in Distributed and Mobile Systems -- A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks -- CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization -- SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms -- Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol -- Compromise-Resilient Anti-jamming for Wireless Sensor Networks -- Session 1D. Cryptanalysis -- On Practical Second-Order Power Analysis Attacks for Block Ciphers -- Consecutive S-box Lookups: A Timing Attack on SNOW 3G -- Session 2A. Authentication -- Efficient Authentication for Mobile and Pervasive Computing -- Security Enhancement and Modular Treatment towards Authenticated Key Exchange -- Federated Secret Handshakes with Support for Revocation -- Session 2B. Fair Exchange Protocols -- An Agent-Mediated Fair Exchange Protocol -- A New Method for Formalizing Optimistic Fair Exchange Protocols -- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme -- Session 2C. Anonymity and Privacy -- Proving Coercion-Resistance of Scantegrity II -- Anonymity and Verifiability in Voting: Understanding (Un)Linkability -- A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms -- Time Warp: How Time Affects Privacy in LBSs -- Session 2D. Software Security -- Return-Oriented Rootkit without Returns (on the x86) -- Experimental Threat Model Reuse with Misuse Case Diagrams -- Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis -- Session 3A. Proxy Cryptosystems -- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities -- Ciphertext Policy Attribute-Based Proxy Re-encryption -- Session 3B. Intrusion Detection Systems -- Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks -- A Trust-Based IDS for the AODV Protocol -- IDS Alert Visualization and Monitoring through Heuristic Host Selection -- A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
520 _aThis book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised full papers presented together with an invited talk were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on access control, public key cryptography and cryptanalysis, security in distributed and mobile systems, cryptanalysis, authentication, fair exchange protocols, anonymity and privacy, software security, proxy cryptosystems, and intrusion detection systems.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 0 _aComputer software.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aCoding and Information Theory.
650 2 4 _aSystems and Data Security.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aComputer Communication Networks.
700 1 _aQing, Sihan.
_eeditor.
700 1 _aLópez, Javier.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642176494
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6476
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-17650-0
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112944
_d112944