List of Accepted Papers (ICICS’04) (pdf, rtf)

 

Number

Paper Title

015

Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario

021

On the Security of a Multi-Party Certified Email Protocol

028

On Randomized Addition-Subtraction-Chains to Counteract Differential Power Attacks

029

Automatic Covert Channel Analysis of a Multilevel Secure Component

039

New ID-Based Ring Signature Schemes

041

Hydan Hiding Information in Program Binaries

052

A New Key-Insulated Signature Scheme

061

Provably Secure Authenticated Tree Based Group Key Agreement

063

Perfect Concurrent Signature Schemes

064

A Qualitative Evaluation of Security Patterns

065

Dynamic Access Control for Multi-Privileged Group Communications

074

On some Weak Extensions of AES and BES

076

Transient Fault Induction Attack on XTR

079

PayFlux -- Secure Electronic Payment in Mobile Ad hoc Networks

090

Security Analysis of the Generalized Self-Shrinking Generator

101

Secure Hierarchical Identity Based Signature and its Application

105

Taxonomic Consideration of OAEP Variants and Their Security

112

Multi-Designated Verifiers Signatures

115

Adaptive-CCA on OpenPGP Revisited

116

New Power Analyses on the Ha-Moon Algorithm and the MIST algorithm

123

Macro-level Attention to Mobile Agent Security Introducing the Mobile Agent Secure Hub Infrastructure Concept

131

Type Inferability and Decidability of the Security Problem against Inference Attacks on Object-Oriented Databases

135

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN

138

An Efficient Authentication Scheme Using Recovery Information in Signature

141

Modified Power-Analysis Attacks on XTR and An Efficient Countermeasure

147

Threat Analysis on NEtwork MObility (NEMO)

170

Reflector Attack Traceback System with Pushback based iTrace Mechanism

180

Factorization-based Fail-Stop Signatures Revisited

182

Rights-Carrying and Self-Enforcing Information Objects for Information Distribution Systems

193

Identification of Traitors Using a Trellis

195

Volatile Memory Computer Forensics To Detect Kernel Level Compromise

196

Modelling Dependencies between Classifiers in Mobile Masquerader Detection

201

Robust Metering Schemes for General Access Structures

204

Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation

209

On the Minimal Assumptions of Group Signature Schemes

210

Exact and Asymptotic Behavior of XL-Related Methods

216

Efficient Time Scoped Searching of Encrypted Audit Logs

218

Sound Approximations to Diffie-Hellman Using Rewrite Rules

219

Securing the Destination Sequenced Distance Vector Routing Protocol (S-DSDV)

225

Public-Secret Storage Trade-Off for Broadcast Encryption Key Management

229

A Semi-Fragile Steganographic Digital Signature for Images

234

Secure Workflow Model based on Distributed Constrained Role and Task Assignment for the Internet