Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings / Edition 1 by Vijay Varadharajan | 9783540666820 | Paperback | Barnes & Noble
Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings / Edition 1

Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings / Edition 1

by Vijay Varadharajan
     
 

ISBN-10: 3540666826

ISBN-13: 9783540666820

Pub. Date: 11/23/1999

Publisher: Springer Berlin Heidelberg

This book constitutes the refereed proceedings of the Second Internati onal Conference on Information and Communication Security, ICICSF99, h eld in Sydney, Australia in November 1999. The 24 revised full papers presented were carefully reviewed and selected from a total of 62 subm issions. The book is divided in topical sections on cryptanalysis, lan guage-based

Overview

This book constitutes the refereed proceedings of the Second Internati onal Conference on Information and Communication Security, ICICSF99, h eld in Sydney, Australia in November 1999. The 24 revised full papers presented were carefully reviewed and selected from a total of 62 subm issions. The book is divided in topical sections on cryptanalysis, lan guage-based approaches to security, electronic commerce and secret sha ring, digital signatures, security protocols, applications, cryptograp hy, and complexity and security functions.

Product Details

ISBN-13:
9783540666820
Publisher:
Springer Berlin Heidelberg
Publication date:
11/23/1999
Series:
Lecture Notes in Computer Science Series, #1726
Edition description:
1999
Pages:
328
Product dimensions:
6.10(w) x 9.17(h) x 0.03(d)

Table of Contents

Keynote Speech.- International Cryptography.- Cryptanalysis.- Reaction Attacks against Several Public-Key Cryptosystem.- Cryptanalysis of Some AES Candidate Algorithms.- Language Based Approach to Security.- Issues in the Design of a Language for Role Based Access Control.- Extending Erlang for Safe Mobile Code Execution.- Electronic Commerce and Secret Sharing.- Detachable Electronic Coins.- Linear Secret Sharing with Divisible Shares.- Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery.- Digital Signatures.- Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.- Signature Scheme for Controlled Environments.- On the Cryptographic Value of the q th Root Problem.- Keynote Speech.- Protecting Critical Information Systems.- Security Prools.- Delegation Chains Secure Up to Constant Length.- Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.- Enhancing the Resistance of a Provably Secure Key Agreement Prool to a Denial-of-Service Attack.- An Extended Logic for Analyzing Timed-Release Public-Key Prools.- Applications.- Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project.- User Identification System Based on Biometrics for Keystroke.- Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards.- Send Message into a Definite Future.- Cryptography.- Efficient Accumulators without Trapdoor Extended Abstract.- Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.- Incremental Authentication of Tree-Structured Documents.- Complexity and Security Functions.- Plateaued Functions.- On the Linear Complexity of the Naor-Reingold Pseudo-Random Function.- On the Channel Capacity of Narrow-Band Subliminal Channels.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >