Information and Communication Security Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings /
ICICS'99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer So...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
1999.
|
Έκδοση: | 1st ed. 1999. |
Σειρά: | Lecture Notes in Computer Science,
1726 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Keynote Speech
- International Cryptography
- Cryptanalysis
- Reaction Attacks against Several Public-Key Cryptosystem
- Cryptanalysis of Some AES Candidate Algorithms
- Language Based Approach to Security
- Issues in the Design of a Language for Role Based Access Control
- Extending Erlang for Safe Mobile Code Execution
- Electronic Commerce and Secret Sharing
- Detachable Electronic Coins
- Linear Secret Sharing with Divisible Shares
- Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery
- Digital Signatures
- Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications
- Signature Scheme for Controlled Environments
- On the Cryptographic Value of the q th Root Problem
- Keynote Speech
- Protecting Critical Information Systems
- Security Protocols
- Delegation Chains Secure Up to Constant Length
- Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks
- Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack
- An Extended Logic for Analyzing Timed-Release Public-Key Protocols
- Applications
- Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project
- User Identification System Based on Biometrics for Keystroke
- Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards
- Send Message into a Definite Future
- Cryptography
- Efficient Accumulators without Trapdoor Extended Abstract
- Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes
- Incremental Authentication of Tree-Structured Documents
- Complexity and Security Functions
- Plateaued Functions
- On the Linear Complexity of the Naor-Reingold Pseudo-Random Function
- On the Channel Capacity of Narrow-Band Subliminal Channels.