Skip to main content
  • Conference proceedings
  • © 2004

Information and Communications Security

6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3269)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2004.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (42 papers)

  1. Front Matter

  2. On the Minimal Assumptions of Group Signature Schemes

    • Michel Abdalla, Bogdan Warinschi
    Pages 1-13
  3. Perfect Concurrent Signature Schemes

    • Willy Susilo, Yi Mu, Fangguo Zhang
    Pages 14-26
  4. New Identity-Based Ring Signature Schemes

    • Javier Herranz, Germán Sáez
    Pages 27-39
  5. Robust Metering Schemes for General Access Structures

    • Ventzislav Nikov, Svetla Nikova, Bart Preneel
    Pages 53-65
  6. PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks

    • Klaus Herrmann, Michael A. Jaeger
    Pages 66-78
  7. Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN

    • Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
    Pages 79-91
  8. Provably Secure Authenticated Tree Based Group Key Agreement

    • Ratna Dutta, Rana Barua, Palash Sarkar
    Pages 92-104
  9. Taxonomic Consideration to OAEP Variants and Their Security

    • Yuichi Komano, Kazuo Ohta
    Pages 105-117
  10. Factorization-Based Fail-Stop Signatures Revisited

    • Katja Schmidt-Samoa
    Pages 118-131
  11. A Qualitative Evaluation of Security Patterns

    • Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides
    Pages 132-144
  12. A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet

    • Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels
    Pages 171-186
  13. Hydan: Hiding Information in Program Binaries

    • Rakan El-Khalil, Angelos D. Keromytis
    Pages 187-199
  14. A Semi-fragile Steganographic Digital Signature for Images

    • Luke Hebbes, Andrew Lenaghan
    Pages 200-210
  15. Identification of Traitors Using a Trellis

    • Marcel Fernandez, Miguel Soriano
    Pages 211-222
  16. Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation

    • Joaquin Garcia, Fabien Autrel, Joan Borrell, Sergio Castillo, Frederic Cuppens, Guillermo Navarro
    Pages 223-235
  17. Reflector Attack Traceback System with Pushback Based iTrace Mechanism

    • Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh
    Pages 236-248

Other Volumes

  1. Information and Communications Security

Editors and Affiliations

  • Department of Information and Communication Technologies, University of A Coruña, Spain

    Javier Lopez

  • Chinese Academy of Sciences, Institute of Softwear, Beijing, China

    Sihan Qing

  • Graduate School of Systems and Information Engineering, University of Tsukuba, Ibaraki, Japan

    Eiji Okamoto

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access