Information and communication security : second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings
| 000 | 01549camuu2200373 a 4500 | |
| 001 | 000001049564 | |
| 005 | 20091120105756 | |
| 008 | 991005s1999 gw a b 001 0 eng | |
| 010 | ▼a 99049196 | |
| 015 | ▼a GB99-81942 | |
| 020 | ▼a 3540666826 (pbk. : alk. paper) | |
| 020 | ▼a 9783540666820 (pbk. : alk. paper) | |
| 035 | ▼a (OCoLC)ocm42619587 | |
| 035 | ▼a (OCoLC)42619587 | |
| 040 | ▼a DLC ▼c DLC ▼d C#P ▼d OHX ▼d UKM ▼d 244002 ▼d 211009 | |
| 042 | ▼a pcc | |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b I554 1999 |
| 072 | 7 | ▼a QA ▼2 lcco |
| 082 | 0 4 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b I61i ▼c 2 | |
| 111 | 2 | ▼a International Conference on Information and Communications Security ▼n (2nd : ▼d 1999 : ▼c Sydney, N.S.W.) |
| 245 | 1 0 | ▼a Information and communication security : ▼b second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / ▼c Vijay Varadharajan, Yi Mu, Eds. |
| 246 | 3 0 | ▼a ICICS'99 |
| 260 | ▼a Berlin ▼a New York : ▼b Springer, ▼c c1999. | |
| 300 | ▼a xi, 323 p. : ▼b ill. ; ▼c 24 cm. | |
| 490 | 1 | ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1726 |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer security ▼v Congresses. |
| 650 | 0 | ▼a Telecommunication systems ▼x Security measures ▼v Congresses. |
| 700 | 1 | ▼a Varadharajan, Vijay. |
| 700 | 1 | ▼a Mu, Yi, ▼d 1955-. |
| 830 | 0 | ▼a Lecture notes in computer science ; ▼v 1726. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 I61i 2 | 등록번호 121186672 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. 2 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 I61i 2 | 등록번호 151081551 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 I61i 2 | 등록번호 121186672 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 I61i 2 | 등록번호 151081551 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
ICICS’99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer Society, IEEE Computer Chapter (NSW), and Harvey World Travel. I am g- teful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors and users of information security systems and technologies. A range of aspects was addressed from security theory and modeling to system and protocol designs and implementations to applications and management. The conference con- sted of a series of refereed technical papers and invited technical presentations. The program committee invited two distinguished key note speakers. The ?rst keynote speech by Doug McGowan, a Senior Manager from Hewlett-Packard, USA, discussed cryptography in an international setting. Doug described the current status of international cryptography and explored possible future trends and new technologies. The second keynote speech was delivered by Sushil Ja- dia of George Mason University, USA. Sushil’s talk addressed the protection of critical information systems. He discussed issues and methods for survivability of systems under malicious attacks and proposed a fault-tolerance based - proach. The conference also hosted a panel on the currently much debated topic of Internet censorship. The panel addressed the issue of censorship from various viewpoints namely legal, industrial, governmental and technical.
ICICS’99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer Society, IEEE Computer Chapter (NSW), and Harvey World Travel. I am g- teful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors and users of information security systems and technologies. A range of aspects was addressed from security theory and modeling to system and protocol designs and implementations to applications and management. The conference con- sted of a series of refereed technical papers and invited technical presentations. The program committee invited two distinguished key note speakers. The ?rst keynote speech by Doug McGowan, a Senior Manager from Hewlett-Packard, USA, discussed cryptography in an international setting. Doug described the current status of international cryptography and explored possible future trends and new technologies. The second keynote speech was delivered by Sushil Ja- dia of George Mason University, USA. Sushil’s talk addressed the protection of critical information systems. He discussed issues and methods for survivability of systems under malicious attacks and proposed a fault-tolerance based - proach. The conference also hosted a panel on the currently much debated topic of Internet censorship. The panel addressed the issue of censorship from various viewpoints namely legal, industrial, governmental and technical.
정보제공 :
목차
CONTENTS Keynote Speech International Cryptography / Doug McGowan = 1 Cryptanalysis Reaction attacks against several public key cryptosystems / C. Hall, I. Goldberg ; B. Schneier = 2 Cryptanalysis of some AES candidate algorithms / W. Wu ; B. Li ; D. Feng ; S. Qing = 13 Language Based Approach to Security Issues in the design of a language for role based access control / M. Hitchens ; V. Varadharajan = 22 Extending Erlang for safe mobile code execution / L. Brown ; D. Sahlin = 39 Electronic Commerce and Secret Sharing Detachable electronic coins / C. Pavlovski ; C. Boyd ; E. Foo = 54 Linear secret sharing with divisible shares / J. Pieprzyk = 71 Efficient publicly verifiable secret sharing schemes with fast or delayed recovery / F. Boudot ; J. Traor$$e'$$ = 87 Digital Signatures Zero-knowledge proofs of possession of EIGamal-like digital signatures and its applications / K. Q. Nguyen ; F. Bao ; Y. Mu ; V. Varadharajan = 103 Signature scheme for controlled environments / K. Viswanathan ; C. Boyd ; E. Dawson = 119 On the cryptographic value of the Qth root problem / C. L. Beaver ; P. S. Gemmell ; A. M. Johnston ; W. Neumann = 135 Keynote Speech Protecting Critical Information Systems / Sushil Jajodia = 143 Security Protocols Delegation chains secure up to constant length / M. Abe ; T. Okamoto = 144 Optimal construction of unconditionally secured ID-based key sharing scheme for large-scale networks / G. Hanaoka ; T. Nishioka ; Y. Zheng ; H. Imai = 157 Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack / S. Hirose ; K. Matsuura = 169 An extended logic for analyzing timed-release public-key protocols / M. Kudo ; A. Mathuria = 183 Applications Bringing together X. 509 and EDIFACT public key infrastructures : The DEDICA project / M. Rubia ; J. C. Cruellas ; M. Medina = 199 User identification system based on biometrics for keystroke / K. Omote ; E. Okamoto = 216 Boundary conditions that influence decisions about log file formats in multi-applicatin smart cards / C. Markantonakis = 230 Sending message into a definite future / W. Mao = 244 Cryptography Efficient accumulators without trapdoor / T. Sander = 252 Evolutionalry heuristics for finding cryptographically strong S-Boxes / W. Millan ; L. Burnett ; G. Garter ; A. Clark ; E. Dawson = 263 Incremental authentication of tree - structured documents / P. Ekdahl and B. Smeets = 275 Complexity and Security Functions Plateaued Functions / Y. Zheng ; X. - M. Zhang = 284 On the linear complexty of the Naor-Reingold pseudo-random function / F. Griffin ; I. E. Shparlinski = 301 On the channel capacity of narrow-band subliminal channels / K. Kobara ; H. Imai = 309 Author Index = 325
