Information and Communication Security Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings /

ICICS'99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer So...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Varadharajan, Vijay (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Mu, Yi (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
Έκδοση:1st ed. 1999.
Σειρά:Lecture Notes in Computer Science, 1726
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Keynote Speech
  • International Cryptography
  • Cryptanalysis
  • Reaction Attacks against Several Public-Key Cryptosystem
  • Cryptanalysis of Some AES Candidate Algorithms
  • Language Based Approach to Security
  • Issues in the Design of a Language for Role Based Access Control
  • Extending Erlang for Safe Mobile Code Execution
  • Electronic Commerce and Secret Sharing
  • Detachable Electronic Coins
  • Linear Secret Sharing with Divisible Shares
  • Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery
  • Digital Signatures
  • Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications
  • Signature Scheme for Controlled Environments
  • On the Cryptographic Value of the q th Root Problem
  • Keynote Speech
  • Protecting Critical Information Systems
  • Security Protocols
  • Delegation Chains Secure Up to Constant Length
  • Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks
  • Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack
  • An Extended Logic for Analyzing Timed-Release Public-Key Protocols
  • Applications
  • Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project
  • User Identification System Based on Biometrics for Keystroke
  • Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards
  • Send Message into a Definite Future
  • Cryptography
  • Efficient Accumulators without Trapdoor Extended Abstract
  • Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes
  • Incremental Authentication of Tree-Structured Documents
  • Complexity and Security Functions
  • Plateaued Functions
  • On the Linear Complexity of the Naor-Reingold Pseudo-Random Function
  • On the Channel Capacity of Narrow-Band Subliminal Channels.