000 05175nam a22006855i 4500
001 978-3-540-88625-9
003 DE-He213
005 20240730185335.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 _a9783540886259
_9978-3-540-88625-9
024 7 _a10.1007/978-3-540-88625-9
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aInformation and Communications Security
_h[electronic resource] :
_b10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings /
_cedited by Liqun Chen, Mark Ryan, Guilin Wang.
250 _a1st ed. 2008.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2008.
300 _aXIII, 436 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5308
505 0 _aInvited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat Modelling in User Performed Authentication -- Access with Fast Batch Verifiable Anonymous Credentials -- Side Channel Analysis -- Quantifying Timing Leaks and Cost Optimisation -- Method for Detecting Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box -- Analysis of Two Attacks on Reduced-Round Versions of the SMS4 -- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack -- Access Control -- Beyond User-to-User Access Control for Online Social Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application Confinement Policy Abstractions -- Towards Role Based Trust Management without Distributed Searching of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data -- Embedding Renewable Cryptographic Keys into Continuous Noisy Data -- Automated Device Pairing for Asymmetric Pairing Scenarios -- Applied Cryptography -- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0. -- Towards an Information Theoretic Analysis of Searchable Encryption -- A Bootstrap Attack on Digital Watermarks in the Frequency Domain -- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval -- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study -- Publicly Verifiable Remote Data Integrity.
520 _aThis book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008. The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on authentication, side channel analysis, cryptanalysis, access control, software security, system security, applied cryptography, and security protocols.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aCoding theory.
_94154
650 0 _aInformation theory.
_914256
650 0 _aComputer programming.
_94169
650 0 _aData structures (Computer science).
_98188
650 0 _aData protection.
_97245
650 0 _aAlgorithms.
_93390
650 1 4 _aCryptology.
_931769
650 2 4 _aCoding and Information Theory.
_9138916
650 2 4 _aProgramming Techniques.
_9138917
650 2 4 _aData Structures and Information Theory.
_931923
650 2 4 _aData and Information Security.
_931990
650 2 4 _aAlgorithms.
_93390
700 1 _aChen, Liqun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138918
700 1 _aRyan, Mark.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138919
700 1 _aWang, Guilin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138920
710 2 _aSpringerLink (Online service)
_9138921
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540886242
776 0 8 _iPrinted edition:
_z9783540886266
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5308
_9138922
856 4 0 _uhttps://doi.org/10.1007/978-3-540-88625-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c92773
_d92773