Information and Communications Security

12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings

Editors:

ISBN: 978-3-642-17649-4 (Print) 978-3-642-17650-0 (Online)

Table of contents (32 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptographic Hash Functions: Theory and Practice

    1. No Access

      Book Chapter

      Pages 1-3

      Cryptographic Hash Functions: Theory and Practice

  3. Session 1A. Access Control

    1. No Access

      Book Chapter

      Pages 4-15

      Rewriting of SPARQL/Update Queries for Securing Data Access

    2. No Access

      Book Chapter

      Pages 16-30

      Fine-Grained Disclosure of Access Policies

  4. Session 1B. Public Key Cryptography and Cryptanalysis

    1. No Access

      Book Chapter

      Pages 31-45

      Manger’s Attack Revisited

    2. No Access

      Book Chapter

      Pages 46-61

      Horizontal Correlation Analysis on Exponentiation

    3. No Access

      Book Chapter

      Pages 62-76

      Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts

  5. Session 1C. Security in Distributed and Mobile Systems

    1. No Access

      Book Chapter

      Pages 77-91

      A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks

    2. No Access

      Book Chapter

      Pages 92-106

      CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization

    3. No Access

      Book Chapter

      Pages 107-125

      SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms

    4. No Access

      Book Chapter

      Pages 126-139

      Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol

    5. No Access

      Book Chapter

      Pages 140-154

      Compromise-Resilient Anti-jamming for Wireless Sensor Networks

  6. Session 1D. Cryptanalysis

    1. No Access

      Book Chapter

      Pages 155-170

      On Practical Second-Order Power Analysis Attacks for Block Ciphers

    2. No Access

      Book Chapter

      Pages 171-185

      Consecutive S-box Lookups: A Timing Attack on SNOW 3G

  7. Session 2A. Authentication

    1. No Access

      Book Chapter

      Pages 186-202

      Efficient Authentication for Mobile and Pervasive Computing

    2. No Access

      Book Chapter

      Pages 203-217

      Security Enhancement and Modular Treatment towards Authenticated Key Exchange

    3. No Access

      Book Chapter

      Pages 218-234

      Federated Secret Handshakes with Support for Revocation

  8. Session 2B. Fair Exchange Protocols

    1. No Access

      Book Chapter

      Pages 235-250

      An Agent-Mediated Fair Exchange Protocol

    2. No Access

      Book Chapter

      Pages 251-265

      A New Method for Formalizing Optimistic Fair Exchange Protocols

    3. No Access

      Book Chapter

      Pages 266-280

      Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme

  9. Session 2C. Anonymity and Privacy

    1. No Access

      Book Chapter

      Pages 281-295

      Proving Coercion-Resistance of Scantegrity II

previous Page of 2