Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings / Edition 1

Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings / Edition 1

by Vijay Varadharajan, Yi Mu
ISBN-10:
3540666826
ISBN-13:
9783540666820
Pub. Date:
11/23/1999
Publisher:
Springer Berlin Heidelberg

Paperback - Rent for

Select a Purchase Option (1999)
  • purchase options
    $109.00
  • purchase options

Overview

Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings / Edition 1

This book constitutes the refereed proceedings of the Second Internati onal Conference on Information and Communication Security, ICICSF99, h eld in Sydney, Australia in November 1999. The 24 revised full papers presented were carefully reviewed and selected from a total of 62 subm issions. The book is divided in topical sections on cryptanalysis, lan guage-based approaches to security, electronic commerce and secret sha ring, digital signatures, security protocols, applications, cryptograp hy, and complexity and security functions.

Product Details

ISBN-13: 9783540666820
Publisher: Springer Berlin Heidelberg
Publication date: 11/23/1999
Series: Lecture Notes in Computer Science Series , #1726
Edition description: 1999
Pages: 328
Product dimensions: 6.10(w) x 9.17(h) x 0.03(d)

Table of Contents

Keynote Speech.- International Cryptography.- Cryptanalysis.- Reaction Attacks against Several Public-Key Cryptosystem.- Cryptanalysis of Some AES Candidate Algorithms.- Language Based Approach to Security.- Issues in the Design of a Language for Role Based Access Control.- Extending Erlang for Safe Mobile Code Execution.- Electronic Commerce and Secret Sharing.- Detachable Electronic Coins.- Linear Secret Sharing with Divisible Shares.- Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery.- Digital Signatures.- Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.- Signature Scheme for Controlled Environments.- On the Cryptographic Value of the q th Root Problem.- Keynote Speech.- Protecting Critical Information Systems.- Security Prools.- Delegation Chains Secure Up to Constant Length.- Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.- Enhancing the Resistance of a Provably Secure Key Agreement Prool to a Denial-of-Service Attack.- An Extended Logic for Analyzing Timed-Release Public-Key Prools.- Applications.- Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project.- User Identification System Based on Biometrics for Keystroke.- Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards.- Send Message into a Definite Future.- Cryptography.- Efficient Accumulators without Trapdoor Extended Abstract.- Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.- Incremental Authentication of Tree-Structured Documents.- Complexity and Security Functions.- Plateaued Functions.- On the Linear Complexity of the Naor-Reingold Pseudo-Random Function.- On the Channel Capacity of Narrow-Band Subliminal Channels.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews