134 records matched your query
06043cam a2200397Ia 4500 001 876141240F3F11DF93771FC5C41A358D 003 SILO 005 20100201083435 006 m d 007 cr mnu 008 081017s2005 gw a sb 101 0 eng d 020 $a 3540320997 020 $a 9783540320999 035 $a (OCoLC)262681468 040 $a GW5XE $b eng $c GW5XE $d SILO $d UMC $d IWA $d SILO 082 04 $a 005.8 $2 22 111 2 $a International Conference on Information and Communications Security $n (7th : $d 2005 : $c Beijing, China) 245 1 $a Information and communications security $h [electronic resource] : $b 7th international conference, ICICS 2005, Beijing, China, December 10-13, 2005 : proceedings / $c Sihan Qing ... [et al.] (eds.). 246 30 $a ICICS 2005 260 $a New York : $b Springer, $c c2005. 300 $a 1 online resource (xiv, 492 p.) : $b ill. 490 1 $a Lecture notes in computer science, $x 0302-9743 ; $v 3783 500 $a Description based on print. 504 $a Includes bibliographical references and index. 505 00 $t DDIPS: an intrusion prevention system for database security / $t An evenhanded certified email system for contract signing / $r Jiazhu Dai, Huaikou Miao. $t Efficient ID-based optimistic fair exchange with provable security / $r Zhenfeng Zhang ... [et al.] -- $t On the quest for impartiality: design and analysis of a fair non-repudiation protocol / $r J. Cederquist ... [et al.] -- $t Generic, optimistic, and efficient schemes for fair certified email delivery / $r Guilin Wang ... [et al.] -- $t DIGITAL SIGNATURES I -- $t Cryptanalysis of a forward secure blind signature scheme with provable security / $r Shuhong Wang ... [et al.] -- $t On delegatability of four designated verifier signatures / $r Yong Li ... [et al.] -- $t PIATS: a partially sanitizable signature scheme / $r Tetsuya Izu ... [et al.] -- $t CRYPTOGRAPHIC PROTOCOLS -- $t Ciphertext comparison, a new solution to the millionaire problem / $r Kun Peng ... [et al.] -- $t Private itemset support counting / $r Sven Laur ... [et al.] -- $t Visual cryptographic protocols using the trusted initializer / $r Hidenori Kuwakado ... [et al.] -- $t Admissible interference by typing for cryptographic protocols / $r Alaaeddine Fellah, John Mullins -- $t CRYPTANALYSIS -- $t On the security bounds of CMC, EME, EME+ and EME* modes of operation / $r Raphael C.-W. Phan, Bok-Min Goi -- $t On the security of encryption modes of MD4, MD5 and HAVAL / $r Jongsung Kim ... [et al.] -- $t Cryptanalysis of PASS II and MiniPass / $r Bok-Min Goi ... [et al.] -- $t Simple power analysis on fast modular reduction with NIST recommended elliptic curves / $r Yasuyuki Sakai, Kouichi Sakurai -- $t DIGITAL SIGNATURES II -- $t Asymmetric concurrent signatures / $r Khanh Nguyen -- $t Generic construction of (identity-based) perfect concurrent signatures / $r Sherman S.M. Chow, Willy Susilo -- $t Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains / $r Huafei Zhu ... [et al.] -- $t NETWORK SECURITY -- $t Session table architecture for defending SYN flood attack / $r Xin Li ... [et al.] -- $t A behavior-based ingress rate-limiting mechanism against DoS/DDoS attacks / $r Song Huang ... [et al.] -- $t Port scan behavior diagnosis by clustering / $r Lanjia Wang ... [et al.] -- $t Network vulnerability analysis through vulnerability take-grant model (VTG) / $r Hamid Reza Shahriari ... [et al.] -- $t APPLIED CRYPTOGRAPHY -- $t Multiplex encryption: a practical approach to encrypting multi-recipient emails / $r Wei Wei ... [et al.] -- $t Secure multicast using proxy encryption / $r Yun-Peng Chiu ... [et al.] -- $t KEY MANAGEMENT -- $t Security properties of two authenticated conference key agreement protocols / $r Qiang Tang, Chris J. Mitchell -- $t Cryptanalysis of two user identification schemes with key distribution preserving anonymity / $r Eun-Jun Yoon, Kee-Young Yoo -- $t Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment / $r Sangjin Kim ... [et al.] -- $t ACCESS CONTROL -- $t Enforce mandatory access control policy on XML documents / $r Lan Li ... [et al.] -- $t Network access control for mobile ad-hoc networks / $r Pan Wang ... [et al.] -- $t Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware / $r Debra L. Cook ... [et al.] -- $t APPLICATIONS -- $t Authenticating query results in data publishing / $r Di Ma ... [et al.] -- $t Multi-source stream authentication framework in case of composite MPEG-4 stream / $r Tieyan Li ... [et al.] -- $t Batching SSL/TLS handshake improved / $r Fang Qi ... [et al.] -- $t Achieving efficient conjunctive keyword searches over encrypted data / $r Lucas Ballard ... [et al.] -- $t WATERMARKING -- $t Total disclosure of the embedding and detection algorithms for a secure digital watermarking scheme for audio / $r David MegiÌas ... [et al.] -- $t Reversible watermark with large capacity using the predictive coding / $r Minoru Kuribayashi ... [et al.] -- $t SYSTEM SECURITY -- $t PCAV: Internet attack visualization on parallel coordinates / $r Hyunsang Choi, Heejo Lee -- $t Implementation of packet filter configurations anomaly detection system with SIERRA / $r Yi Yin ... [et al.] -- $t DDIPS: an intrusion prevention system for database security / $r Jiazhu Dai, Huaikou Miao. 650 0 $a Computer security $v Congresses. 650 0 $a Telecommunication systems $x Security measures $v Congresses. 700 1 $a Qing, Sihan. 776 08 $i Print version: $a International Conference on Information and Communications Security (7th : 2005 : Beijing, China). $t Information and communications security. $d Berlin ; New York : Springer, c2005 $z 3540309349 $w (OCoLC)62742974 $w (OCoLC)62742974 830 0 $a Lecture notes in computer science ; $v 3783 856 40 $u http://dx.doi.org/10.1007/11602897 856 40 $u http://proxy.lib.iastate.edu:2048/login?url=http://www.springerlink.com/openurl.asp?genre=book&isbn=3-540-30934-9 941 $a 1 952 $l USUX851 $d 20160825043810.0 956 $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=876141240F3F11DF93771FC5C41A358D 994 $a 02 $b IWAInitiate Another SILO Locator Search