Limit search to available items
Book Cover
Book
Author ICICS (Conference) (2nd : 1999 : Sydney, N.S.W.)

Title Information and communication security : second international conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / Vijay Varadharajan, Yi Mu, Eds
Published Berlin ; New York : Springer, 1999

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Int/Iac 1999  AVAILABLE
Description xi, 323 pages : illustrations ; 24 cm
Series Lecture notes in computer science, 0302-9743 ; 1726
Lecture notes in computer science ; 1726
Contents International Cryptography / Doug McGowan -- Reaction attacks against several public key cryptosystems / C. Hall, I. Goldberg and B. Schneier -- Cryptanalysis of some AES candidate algorithms / W. Wu, B. Li and D. Feng / [et al.] -- Issues in the design of a language for role based access control / M. Hitchens and V. Varadharajan -- Extending Erlang for safe mobile code execution / L. Brown and D. Sahlin -- Detachable electronic coins / C. Pavlovski, C. Boyd and E. Foo -- Linear secret sharing with divisible shares / J. Pieprzyk -- Efficient publicly verifiable secret sharing schemes with fast or delayed recovery / F. Boudot and J. Traore -- Zero-knowledge proofs of possession of ElGamal-like digital signatures and its applications / K. Q. Nguyen, F. Bao and Y. Mu / [et al.] -- Signature scheme for controlled environments / K. Viswanathan, C. Boyd and E. Dawson -- On the cryptographic value of the Qth root problem / C. L. Beaver, P. S. Gemmell and A. M. Johnston / [et al.] -- Protecting Critical Information Systems / Sushil Jajodia -- Delegation chains secure up to constant length / M. Abe and T. Okamoto -- Optimal construction of unconditionally secured ID-based key sharing scheme for large-scale networks / G. Hanaoka, T. Nishioka and Y. Zheng / [et al.] -- Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack / S. Hirose and K. Matsuura -- An extended logic for analyzing timed-release public-key protocols / M. Kudo and A. Mathuria -- Bringing together X.509 and EDIFACT public key infrastructures: The DEDICA project / M. Rubia, J. C. Cruellas and M. Medina -- User identification system based on biometrics for keystroke / K. Omote and E. Okamoto -- Boundary conditions that influence decisions about log file formats in multi-application smart cards / C. Markantonakis -- Sending message into a definite future / W. Mao -- Efficient accumulators without trapdoor / T. Sander -- Evolutionary heuristics for finding cryptographically strong S-Boxes / W. Millan, L. Burnett and G. Garter / [et al.] -- Incremental authentication of tree-structured documents / P. Ekdahl and B. Smeets -- Plateaued Functions / Y. Zheng and X.-M. Zhang -- On the linear complexity of the Naor-Reingold pseudo-random function / F. Griffin and I. E. Shparlinski -- On the channel capacity of narrow-band subliminal channels / K. Kobara and H. Imai.ct / Cath
Summary This book constitutes the refereed proceedings of the Second International Conference on Information and Communication Security, ICICS'99, held in Sydney, Australia in November 1999. The 24 revised full papers presented were carefully reviewed and selected from a total of 62 submissions. The book is divided in topical sections on cryptanalysis, language-based approaches to security, electronic commerce and secret sharing, digital signatures, security protocols, applications, cryptography, and complexity and security functions
Bibliography Includes bibliographical references and index
Notes Also available in print
Mode of access: World Wide Web
Subject Computer security -- Congresses.
Telecommunication systems -- Security measures -- Congresses.
Genre/Form Kongress
Kongress
Conference papers and proceedings.
Sydney (1999)
Sydney (2001)
Conference papers and proceedings.
Author Varadharajan, Vijay.
Mu, Yi.
ICICS (Conference) (2nd : 1999 : Sydney, N.S.W.)
LC no. 99049196
ISBN 3540666826 softcover