HOME > 상세정보

상세정보

Information and communication security : second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings

Information and communication security : second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings

자료유형
단행본
개인저자
Varadharajan, Vijay. Mu, Yi, 1955-.
서명 / 저자사항
Information and communication security : second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / Vijay Varadharajan, Yi Mu, Eds.
발행사항
Berlin   New York :   Springer,   c1999.  
형태사항
xi, 323 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1726
ISBN
3540666826 (pbk. : alk. paper) 9783540666820 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Telecommunication systems -- Security measures -- Congresses.
000 01549camuu2200373 a 4500
001 000001049564
005 20091120105756
008 991005s1999 gw a b 001 0 eng
010 ▼a 99049196
015 ▼a GB99-81942
020 ▼a 3540666826 (pbk. : alk. paper)
020 ▼a 9783540666820 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm42619587
035 ▼a (OCoLC)42619587
040 ▼a DLC ▼c DLC ▼d C#P ▼d OHX ▼d UKM ▼d 244002 ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I554 1999
072 7 ▼a QA ▼2 lcco
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I61i ▼c 2
111 2 ▼a International Conference on Information and Communications Security ▼n (2nd : ▼d 1999 : ▼c Sydney, N.S.W.)
245 1 0 ▼a Information and communication security : ▼b second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / ▼c Vijay Varadharajan, Yi Mu, Eds.
246 3 0 ▼a ICICS'99
260 ▼a Berlin ▼a New York : ▼b Springer, ▼c c1999.
300 ▼a xi, 323 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1726
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Telecommunication systems ▼x Security measures ▼v Congresses.
700 1 ▼a Varadharajan, Vijay.
700 1 ▼a Mu, Yi, ▼d 1955-.
830 0 ▼a Lecture notes in computer science ; ▼v 1726.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I61i 2 등록번호 121186672 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 I61i 2 등록번호 151081551 도서상태 대출가능 반납예정일 예약 서비스 B M ?
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I61i 2 등록번호 121186672 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 I61i 2 등록번호 151081551 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

ICICS’99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer Society, IEEE Computer Chapter (NSW), and Harvey World Travel. I am g- teful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors and users of information security systems and technologies. A range of aspects was addressed from security theory and modeling to system and protocol designs and implementations to applications and management. The conference con- sted of a series of refereed technical papers and invited technical presentations. The program committee invited two distinguished key note speakers. The ?rst keynote speech by Doug McGowan, a Senior Manager from Hewlett-Packard, USA, discussed cryptography in an international setting. Doug described the current status of international cryptography and explored possible future trends and new technologies. The second keynote speech was delivered by Sushil Ja- dia of George Mason University, USA. Sushil’s talk addressed the protection of critical information systems. He discussed issues and methods for survivability of systems under malicious attacks and proposed a fault-tolerance based - proach. The conference also hosted a panel on the currently much debated topic of Internet censorship. The panel addressed the issue of censorship from various viewpoints namely legal, industrial, governmental and technical.

ICICS’99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer Society, IEEE Computer Chapter (NSW), and Harvey World Travel. I am g- teful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors and users of information security systems and technologies. A range of aspects was addressed from security theory and modeling to system and protocol designs and implementations to applications and management. The conference con- sted of a series of refereed technical papers and invited technical presentations. The program committee invited two distinguished key note speakers. The ?rst keynote speech by Doug McGowan, a Senior Manager from Hewlett-Packard, USA, discussed cryptography in an international setting. Doug described the current status of international cryptography and explored possible future trends and new technologies. The second keynote speech was delivered by Sushil Ja- dia of George Mason University, USA. Sushil’s talk addressed the protection of critical information systems. He discussed issues and methods for survivability of systems under malicious attacks and proposed a fault-tolerance based - proach. The conference also hosted a panel on the currently much debated topic of Internet censorship. The panel addressed the issue of censorship from various viewpoints namely legal, industrial, governmental and technical.


정보제공 : Aladin

목차


CONTENTS

Keynote Speech

 International Cryptography / Doug McGowan = 1

Cryptanalysis

 Reaction attacks against several public key cryptosystems / C. Hall, I. Goldberg ; B. Schneier = 2

 Cryptanalysis of some AES candidate algorithms / W. Wu ; B. Li ; D. Feng ; S. Qing = 13

Language Based Approach to Security

 Issues in the design of a language for role based access control / M. Hitchens ; V. Varadharajan = 22

 Extending Erlang for safe mobile code execution / L. Brown ; D. Sahlin = 39

Electronic Commerce and Secret Sharing

 Detachable electronic coins / C. Pavlovski ; C. Boyd ; E. Foo = 54

 Linear secret sharing with divisible shares / J. Pieprzyk = 71

 Efficient publicly verifiable secret sharing schemes with fast or delayed recovery / F. Boudot ; J. Traor$$e'$$ = 87

Digital Signatures

 Zero-knowledge proofs of possession of EIGamal-like digital signatures and its applications / K. Q. Nguyen ; F. Bao ; Y. Mu ; V. Varadharajan = 103

 Signature scheme for controlled environments / K. Viswanathan ; C. Boyd ; E. Dawson = 119

 On the cryptographic value of the Qth root problem / C. L. Beaver ; P. S. Gemmell ; A. M. Johnston ; W. Neumann = 135

Keynote Speech

 Protecting Critical Information Systems / Sushil Jajodia = 143

Security Protocols

 Delegation chains secure up to constant length / M. Abe ; T. Okamoto = 144

 Optimal construction of unconditionally secured ID-based key sharing scheme for large-scale networks / G. Hanaoka ; T. Nishioka ; Y. Zheng ; H. Imai = 157

 Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack / S. Hirose ; K. Matsuura = 169

 An extended logic for analyzing timed-release public-key protocols / M. Kudo ; A. Mathuria = 183

Applications

 Bringing together X. 509 and EDIFACT public key infrastructures : The DEDICA project / M. Rubia ; J. C. Cruellas ; M. Medina = 199

 User identification system based on biometrics for keystroke / K. Omote ; E. Okamoto = 216

 Boundary conditions that influence decisions about log file formats in multi-applicatin smart cards / C. Markantonakis = 230

 Sending message into a definite future / W. Mao = 244

Cryptography

 Efficient accumulators without trapdoor / T. Sander = 252

 Evolutionalry heuristics for finding cryptographically strong S-Boxes / W. Millan ; L. Burnett ; G. Garter ; A. Clark ; E. Dawson = 263

 Incremental authentication of tree - structured documents / P. Ekdahl and B. Smeets = 275

Complexity and Security Functions

 Plateaued Functions / Y. Zheng ; X. - M. Zhang = 284

 On the linear complexty of the Naor-Reingold pseudo-random function / F. Griffin ; I. E. Shparlinski = 301

 On the channel capacity of narrow-band subliminal channels / K. Kobara ; H. Imai = 309

Author Index = 325



관련분야 신착자료

Harvard Business Review (2025)