Information Security 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings /

As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Sec...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Chan, Agnes Hui (Editor, http://id.loc.gov/vocabulary/relators/edt), Gligor, Virgil (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Edition:1st ed. 2002.
Series:Lecture Notes in Computer Science, 2433
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Intrusion Detection and Tamper Resistance
  • Real-Time Intruder Tracing through Self-Replication
  • On the Difficulty of Protecting Private Keys in Software
  • Intrusion Detection with Support Vector Machines and Generative Models
  • Cryptographic Algorithm and Attack Implementation
  • Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI
  • Fast Software Implementations of SC2000
  • Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512
  • Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG
  • Access Control and Trust Management (I)
  • Role-Based Access Control for E-commerce Sea-of-Data Applications
  • An Access Control Model for Tree Data Structures
  • A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI
  • Authentication and Privacy
  • Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks
  • Quantifying Privacy Leakage through Answering Database Queries
  • A New Offiine Privacy Protecting E-cash System with Revokable Anonymity
  • E-commerce Protocols (I)
  • Receipt-Free Sealed-Bid Auction
  • Exclusion-Freeness in Multi-party Exchange Protocols
  • A Realistic Protocol for Multi-party Certified Electronic Mail
  • Signature Schemes
  • A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification
  • Comments to the UNCITRAL Model Law on Electronic Signatures
  • An Anonymous Loan System Based on Group Signature Scheme
  • Traceability Schemes for Signed Documents*
  • Cryptography (I)
  • Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications
  • Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m)
  • Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m)
  • Access Control and Trust Management (II)
  • Conditional Cryptographic Delegation for P2P Data Sharing
  • Certification of Public Keys within an Identity Based System
  • A New Public Key Cryptosystem for Constrained Hardware
  • Key Management
  • A Distributed and Computationally Secure Key Distribution Scheme*
  • On Optimal Hash Tree Traversal for Interval Time-Stamping
  • An Efficient Dynamic and Distributed Cryptographic Accumulator*
  • Security Analysis
  • A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks
  • Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
  • Automated Analysis of Some Security Mechanisms of SCEP*
  • An Attack on a Protocol for Certified Delivery
  • E-commerce Protocols (II)
  • Oblivious Counter and Majority Protocol
  • Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network
  • Fingerprinting Concatenated Codes with Efficient Identification
  • Cryptography (II)
  • A Provably Secure Additive and Multiplicative Privacy Homomorphism*
  • Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.