↓ Skip to main content

Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings

Overview of attention for book
Cover of 'Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
  3. Altmetric Badge
    Chapter 2 New Construction of Group Secret Handshakes Based on Pairings
  4. Altmetric Badge
    Chapter 3 nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
  5. Altmetric Badge
    Chapter 4 An Efficient Password-Only Two-Server Authenticated Key Exchange System
  6. Altmetric Badge
    Chapter 5 Formal Definition and Construction of Nominative Signature
  7. Altmetric Badge
    Chapter 6 Short Group Signature Without Random Oracles
  8. Altmetric Badge
    Chapter 7 (Convertible) Undeniable Signatures Without Random Oracles
  9. Altmetric Badge
    Chapter 8 A New Dynamic Accumulator for Batch Updates
  10. Altmetric Badge
    Chapter 9 Preventing Unofficial Information Propagation
  11. Altmetric Badge
    Chapter 10 A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction
  12. Altmetric Badge
    Chapter 11 Privacy Protection on Multiple Sensitive Attributes
  13. Altmetric Badge
    Chapter 12 Audio Watermarking Algorithm Based on Centroid and Statistical Features
  14. Altmetric Badge
    Chapter 13 A Semi-blind Watermarking Based on Discrete Wavelet Transform
  15. Altmetric Badge
    Chapter 14 On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme
  16. Altmetric Badge
    Chapter 15 High Speed Modular Divider Based on GCD Algorithm
  17. Altmetric Badge
    Chapter 16 MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set
  18. Altmetric Badge
    Chapter 17 Compact and Secure Design of Masked AES S-Box
  19. Altmetric Badge
    Chapter 18 Boudot’s Range-Bounded Commitment Scheme Revisited
  20. Altmetric Badge
    Chapter 19 Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions
  21. Altmetric Badge
    Chapter 20 Secure Multiparty Computation of DNF
  22. Altmetric Badge
    Chapter 21 Square Like Attack on Camellia
  23. Altmetric Badge
    Chapter 22 Differential Fault Analysis on CLEFIA
  24. Altmetric Badge
    Chapter 23 Extending FORK-256 Attack to the Full Hash Function
  25. Altmetric Badge
    Chapter 24 Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard
  26. Altmetric Badge
    Chapter 25 A Framework for Game-Based Security Proofs
  27. Altmetric Badge
    Chapter 26 What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security
  28. Altmetric Badge
    Chapter 27 Modeling Agreement Problems in the Universal Composability Framework
  29. Altmetric Badge
    Chapter 28 A System Architecture for History-Based Access Control for XML Documents
  30. Altmetric Badge
    Chapter 29 Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
  31. Altmetric Badge
    Chapter 30 Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies
  32. Altmetric Badge
    Chapter 31 A Novel Approach for Untrusted Code Execution
  33. Altmetric Badge
    Chapter 32 Detection and Diagnosis of Control Interception
  34. Altmetric Badge
    Chapter 33 BIOS Security Analysis and a Kind of Trusted BIOS
  35. Altmetric Badge
    Chapter 34 Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
  36. Altmetric Badge
    Chapter 35 DDoS Attack Detection Algorithms Based on Entropy Computing
  37. Altmetric Badge
    Chapter 36 Firewall for Dynamic IP Address in Mobile IPv6
  38. Altmetric Badge
    Chapter 37 Application of the PageRank Algorithm to Alarm Graphs
  39. Altmetric Badge
    Chapter 38 Drive-By Pharming
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

wikipedia
1 Wikipedia page

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings
Published by
Springer, January 2007
DOI 10.1007/978-3-540-77048-0
ISBNs
978-3-54-077047-3, 978-3-54-077048-0
Authors

Qing, Sihan, Imai, Hideki, Wang, Guilin

Editors

Sihan Qing, Hideki Imai, Guilin Wang

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Portugal 1 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 1 100%
Readers by discipline Count As %
Computer Science 1 100%