LEADER 06201nam 22009495 450 001 9910484761003321 005 20251226200642.0 010 $a3-540-77048-8 024 7 $a10.1007/978-3-540-77048-0 035 $a(CKB)1000000000490670 035 $a(SSID)ssj0000318243 035 $a(PQKBManifestationID)11283547 035 $a(PQKBTitleCode)TC0000318243 035 $a(PQKBWorkID)10310507 035 $a(PQKB)11397786 035 $a(DE-He213)978-3-540-77048-0 035 $a(MiAaPQ)EBC3065066 035 $a(MiAaPQ)EBC6707258 035 $a(Au-PeEL)EBL6707258 035 $a(PPN)12373620X 035 $a(MiAaPQ)EBC337278 035 $a(BIP)34165160 035 $a(BIP)17712416 035 $a(EXLCZ)991000000000490670 100 $a20100715d2007 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation and Communications Security $e9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings /$fedited by Hideki Imai, Guilin Wang 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XIV, 514 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4861 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-77047-X 320 $aIncludes bibliographical references and index. 327 $aAuthentication and Key Exchange -- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords -- An Efficient Password-Only Two-Server Authenticated Key Exchange System -- Digital Signatures -- Formal Definition and Construction of Nominative Signature -- Short Group Signature Without Random Oracles -- (Convertible) Undeniable Signatures Without Random Oracles -- Applications -- A New Dynamic Accumulator for Batch Updates -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction -- Privacy Protection on Multiple Sensitive Attributes -- Watermarking -- Audio Watermarking Algorithm Based on Centroid and Statistical Features -- A Semi-blind Watermarking Based on Discrete Wavelet Transform -- Fast Implementations -- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme -- High Speed Modular Divider Based on GCD Algorithm -- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set -- Compact and Secure Design of Masked AES S-Box -- Applied Cryptography -- Boudot?s Range-Bounded Commitment Scheme Revisited -- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions -- Secure Multiparty Computation of DNF -- Cryptanalysis -- Square Like Attack on Camellia -- Differential Fault Analysis on CLEFIA -- Extending FORK-256 Attack to the Full Hash Function -- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard -- Formal Analysis -- A Framework for Game-Based Security Proofs -- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security -- Modeling Agreement Problems in the Universal Composability Framework -- System Security I -- A System Architecture for History-Based Access Control for XML Documents -- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing -- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies -- System Security II -- A Novel Approach for Untrusted Code Execution -- Detection and Diagnosis of Control Interception -- BIOS Security Analysis and a Kind of Trusted BIOS -- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots -- Network Security -- DDoS Attack Detection Algorithms Based on Entropy Computing -- Firewall for Dynamic IP Address in Mobile IPv6 -- Application of the PageRank Algorithm to Alarm Graphs -- Drive-By Pharming. 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The papers presented were carefully reviewed and selected. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4861 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aAlgorithms 606 $aCryptology 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aIT Operations 606 $aComputers and Society 606 $aAlgorithms 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aAlgorithms. 676 $a005.8 686 $a004$2sdnb 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aImai$b Hideki$f1943- 702 $aQing$b Sihan 702 $aWang$b Guilin$cDr., 712 12$aInternational Conference on Information and Communications Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484761003321 996 $aInformation and Communications Security$9771899 997 $aUNINA