Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings / Edition 1by Vijay Varadharajan
Pub. Date: 11/23/1999
Publisher: Springer Berlin Heidelberg
This book constitutes the refereed proceedings of the Second Internati onal Conference on Information and Communication Security, ICICSF99, h eld in Sydney, Australia in November 1999. The 24 revised full papers presented were carefully reviewed and selected from a total of 62 subm issions. The book is divided in topical sections on cryptanalysis, lan guage-based
This book constitutes the refereed proceedings of the Second Internati onal Conference on Information and Communication Security, ICICSF99, h eld in Sydney, Australia in November 1999. The 24 revised full papers presented were carefully reviewed and selected from a total of 62 subm issions. The book is divided in topical sections on cryptanalysis, lan guage-based approaches to security, electronic commerce and secret sha ring, digital signatures, security protocols, applications, cryptograp hy, and complexity and security functions.
Table of Contents
Keynote Speech.- International Cryptography.- Cryptanalysis.- Reaction Attacks against Several Public-Key Cryptosystem.- Cryptanalysis of Some AES Candidate Algorithms.- Language Based Approach to Security.- Issues in the Design of a Language for Role Based Access Control.- Extending Erlang for Safe Mobile Code Execution.- Electronic Commerce and Secret Sharing.- Detachable Electronic Coins.- Linear Secret Sharing with Divisible Shares.- Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery.- Digital Signatures.- Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.- Signature Scheme for Controlled Environments.- On the Cryptographic Value of the q th Root Problem.- Keynote Speech.- Protecting Critical Information Systems.- Security Prools.- Delegation Chains Secure Up to Constant Length.- Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.- Enhancing the Resistance of a Provably Secure Key Agreement Prool to a Denial-of-Service Attack.- An Extended Logic for Analyzing Timed-Release Public-Key Prools.- Applications.- Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project.- User Identification System Based on Biometrics for Keystroke.- Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards.- Send Message into a Definite Future.- Cryptography.- Efficient Accumulators without Trapdoor Extended Abstract.- Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.- Incremental Authentication of Tree-Structured Documents.- Complexity and Security Functions.- Plateaued Functions.- On the Linear Complexity of the Naor-Reingold Pseudo-Random Function.- On the Channel Capacity of Narrow-Band Subliminal Channels.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >