Limit search to available items
Book Cover
Author ICICS (Conference) (1st : 1997 : Beijing, China)

Title Information and communications security : first international conference, ICIS'97, Beijing, China, November 11-14, 1997 : proceedings / Yongfei Han, Tatsuaki Okamoto, Sihan Qing (eds.)
Published Berlin ; New York : Springer, [1997]


Location Call no. Vol. Availability
 W'PONDS  005.8 Int/Iac 1997  AVAILABLE
Description x, 484 pages : illustrations ; 24 cm
Series Lecture notes in computer science, 0302-9743 ; 1334
Lecture notes in computer science ; 1334
Contents Minimizing the use of random oracles in authenticated encryption schemes / Mihir Bellare and Phillip Rogaway -- Zero-knowledge proofs of decision power: new protocols and optimal round-complexity / Giovanni Di Crescenzo, Kouichi Sakurai and Moti Yung -- Computational learning theoretic cryptanalysis of language theoretic cryptosystems / Takeshi Koshiba -- A language for specifying sequences of authorization transformations and its applications / Yun Bai and Vijay Varadharajan -- On the decomposition constructions for perfect secret sharing schemes / Hung-Min Sun and Bor-Liang Chen -- Traceable visual cryptography / Ingrid Biehl and Susanne Wetzel -- Remarks on the multiple assignment secret sharing scheme / Hossein Ghodosi, Josef Pieprzyk and Rei Safavi-Naini -- Secret sharing in hierarchical groups / Chris Charnes, Keith Martin and Josef Pieprzyk [et al.] -- Stateless connections / Tuomas Aura and Pekka Nikander -- Design of a security platform for CORBA based application / Rakman Choi, Jungchan Na and Kwonil Lee [et al.] -- Secure document management and distribution in an open network environment / Antonio Lioy, Fabio Maino and Marco Mezzalama -- A[superscript 2] - code = Affine resolvable + BIBD / Satoshi Obana and Kaoru Kurosawa -- Multisender authentication systems with unconditional security / K. M. Martin and Rei Safavi-Naini -- Proposal of user identification scheme using mouse / Kenichi Hayashi, Eiji Okamoto and Masahiro Mambo -- An effective genetic algorithm for finding highly nonlinear Boolean Functions / William Millan, Andrew Clark and Ed Dawson -- Duality of Boolean functions and its cryptographic significance / Xiao-Mo Zhang, Yuliang Zheng and Hideki Imai -- Construction of correlation immune Boolean functions / Ed Dawson and Chuan-Kun Wu -- An improved key stream generator based on the programmable cellular automata / Miodrag J. Mihaljevic -- A Trust policy framework / Audum Josang -- Critical analysis of security in voice hiding techniques / Liwu Chang and S. Moskowitz -- Two efficient RSA multisignature schemes / Sangjoon Park, Sangwoo Park and Kwangjo Kim [et al.] -- Proxy signatures, Revisited / Seungjoo Kim, Sangjoon Park and Dongho Won -- Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA / John Kelsey, Bruce Schneier and David Wagner -- A multiplication-addition structure against differential attack / Feng Zhu and Bao-An Guo -- On strict estimation method of provable security against differential / Yasuyoshi Kaneko, Shiho Moriai and Kazuo Ohta -- Improved fast software implementation of block ciphers / Takeshi Shimoyama, Seiichi Amada and Shiho Moriai -- Security comments on the Hwang-Chen algebraic-code cryptosystem / Mohssen M. Alabbadi -- Efficient elliptic curve exponentiation / Atsuko Miyaji, Takatoshi Ono and Henri Cohen -- Efficient construction of secure hyperelliptic discrete logarithm problems / Jinhui Chao, Nori Matsuda and Shigeo Tsujii -- A new and optimal chosen-message attack on RSA-type cryptosystems / Daniel Bleichenbache, Marc Joye and Jean-Jacques Quisquater -- On weak RSA-keys produced from Pretty Good Privacy / Yasuyuki Sakai, Kouichi Sakurai and Iiirokazu Ishizuka -- Self-synchronized message randomization methods for subliminal channels / Kazukuni Kobara and Hideki Imai -- Hiding the Hidden: A software system for concealing ciphertext as innocuous text / Mark Chapman and George Davida -- Digital signature and public key cryptosystem in a prime order subgroup of Z[subscript n]* / Colin Boyd -- Trapdoor one-way permutations and multivariate polynomials / Jacques Patarin and Louis Goubin -- Asymmetric cryptography with S-Boxes / Jacques Patarin and Louis Goubin -- On the powerline system / Paul Camion and Herve Chabanne -- Making unfair a "fair" blind signature scheme / Jacques Traore -- Enforcing traceability in software / Colin Boyd -- Publicly verifiable partial key escrow / Wenbo Mao -- A secure code for recipient watermarking against conspiracy attacks by all users / Hajime Watanabe and Tadao Kasami -- Protocols for issuing public-key certificates over the Internet / James W. Gray III and Kin Fai Epsilon -- Distributed cryptographic function application protocols / Andre Postma, Thijs Krol and Egbert Molenkamp -- Fault tolerant anonymous channel / Wakaha Ogata, Kaoru Kurosawa and Kazue Sako [et al.] -- An implementable scheme for secure delegation of computing and data / Josep Domingo - Ferrer and Ricardo X. Sanchez del Castillo -- Electronic commerce with secure intelligent trade agent / Jaco van der Merwe and S. H. von Solms -- Efficient scalable fair cash with off-line extortion prevention / Holger Peterson and Guillaume Poupard -- An anonymous and undeniable payment scheme / Liqun Chen and Chris J. Mitchell
Includes index
Bibliography Includes bibliographical references and index
Subject Computer security -- Congresses.
Telecommunication systems -- Security measures -- Congresses.
Genre/Form Conference papers and proceedings.
Author Han, Yongfei.
Okamoto, Tatsuaki.
Qing, Sihan.
ICICS (Conference) (1st : 1997 : Beijing, China)
LC no. 97045485
ISBN 354063696X (softcover : alk. paper)
Other Titles First International Conference, ICICS '97