LEADER 01286nam 2200313Ia 450 001 996386134503316 005 20200824132418.0 035 $a(CKB)1000000000601404 035 $a(EEBO)2240867080 035 $a(OCoLC)ocm13663415e 035 $a(OCoLC)13663415 035 $a(EXLCZ)991000000000601404 100 $a19860530d1674 uy | 101 0 $aeng 135 $aurbn#|||a|bb| 200 12$aA sermon preached at the consecration of a chappel in the house of John Collins, Esq., of Chute in Wiltshire, performed by the Right Reverend Father in in [sic] God Seth, Lord Bishop of Sarum, on the 25th of September, 1673$b[electronic resource] /$fby Joseph Kelsey .. 210 $aLondon $cPrinted for Jonathan Edwin ...$d1674 215 $a[4], 32 p 300 $aReproduction of original in Duke University Library. 330 $aeebo-0040 700 $aKelsey$b Joseph$fd. 1710.$01014158 801 0$bEAA 801 1$bEAA 801 2$bm/c 801 2$bWaOLN 906 $aBOOK 912 $a996386134503316 996 $aA sermon preached at the consecration of a chappel in the house of John Collins, Esq., of Chute in Wiltshire, performed by the Right Reverend Father in in God Seth, Lord Bishop of Sarum, on the 25th of September, 1673$92399114 997 $aUNISA LEADER 07622nam 22007695 450 001 9910143895903321 005 20231025170704.0 010 $a3-540-36159-6 024 7 $a10.1007/3-540-36159-6 035 $a(CKB)1000000000211823 035 $a(SSID)ssj0000323965 035 $a(PQKBManifestationID)11245092 035 $a(PQKBTitleCode)TC0000323965 035 $a(PQKBWorkID)10318951 035 $a(PQKB)10136878 035 $a(DE-He213)978-3-540-36159-6 035 $a(MiAaPQ)EBC3073197 035 $a(PPN)15518931X 035 $a(EXLCZ)991000000000211823 100 $a20121227d2002 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation and Communications Security $e4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings /$fedited by Robert H. Deng, Feng Bao, Jianying Zhou 205 $a1st ed. 2002. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2002. 215 $a1 online resource (XII, 500 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2513 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-00164-6 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aSystem Security I -- Defenses against the Truncation of Computation Results of Free-Roaming Agents -- A Distributed Dynamic ?Firewall Architecture with Mobile Agents and KeyNote Trust Management System -- Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack -- An Evaluation of Different IP Traceback Approaches -- Security against Inference Attacks on Negative Information in Object-Oriented Databases -- Cryptosystem I -- Robust Key-Evolving Public Key Encryption Schemes -- A Group Signature Scheme Committing the Group -- Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions -- Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption -- Reducing the Memory Complexity of Type-Inference Algorithms -- Security Protocol I -- The Risks of Compromising Secret Information -- Password-Authenticated Key Exchange between Clients with Different Passwords -- Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction -- Attacking Predictable IPsec ESP Initialization Vectors -- Fingerprinting & Watermarking -- An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code -- A Robust Block Oriented Watermarking Scheme in Spatial Domain -- A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing -- Efficient Implementation of Algorithms -- Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fields -- Fast Elliptic Curve Multiplications with SIMD Operations -- Further Results on Multiples of Primitive Polynomials and Their Products over GF(2) -- System Security II -- A Secure Object Sharing Scheme for Java Card -- IDS Interoperability and Correlation Using IDMEF and Commodity Systems -- A Synthetic Fraud Data Generation Methodology -- User Interaction Design for Secure Systems -- Using Independent Auditors as Intrusion Detection Systems -- Cryptosystem II -- Cellular Automata Based Cryptosystem (CAC) -- New Weak-Key Classes of IDEA -- Risks with Raw-Key Masking ? The Security Evaluation of 2-Key XCBC -- A New Statistical Testing for Symmetric Ciphers and Hash Functions -- Message Authentication Codes with Error Correcting Capabilities -- Access Control -- The Consistency of an Access Control List -- Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies -- A Specification Language for Distributed Policy Control -- Access Control Infrastructure for Digital Objects -- Security Protocol II -- Distributed Key Generation as a Component of an Integrated Protocol -- A Secure Agent-Mediated Payment Protocol -- Cryptanalysis & Cryptographic Techniques -- Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties -- Related-Cipher Attacks -- A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 -- Ideal Threshold Schemes from Orthogonal Arrays -- Cryptanalysis of the Reduced-Round RC6. 330 $aThis volume contains the proceedings of the 4th International Conference on information and Communications Security (ICICS2002). The three previous conferences were held in Beijing(ICICS97), Sydney(ICICS99) and Xian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International Communications and Information Security Association (ICISA). During the past five years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by offering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and difficult?only 41 papers were accepted and many good papers had to be rejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2513 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aComputer science?Mathematics 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 0$aComputer science?Mathematics. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aDeng$b Robert H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBao$b Feng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Information and Communications Security 906 $aBOOK 912 $a9910143895903321 996 $aInformation and Communications Security$9771899 997 $aUNINA