HOME > 상세정보

상세정보

Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings

Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings

자료유형
단행본
개인저자
Han, Yongfei. Okamoto, Tatsuaki. Qing, Sihan.
서명 / 저자사항
Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings / Yongfei Han, Tatsuaki Okamoto, Sihan Qing (eds.).
발행사항
Berlin ;   New York :   Springer,   c1997.  
형태사항
x, 484 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1334
ISBN
354063696X (pbk. : alk. paper) 9783540636960 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Telecommunication systems -- Security measures -- Congresses.
000 01613camuu2200385 a 4500
001 000045561996
005 20091126164303
008 971009s1997 gw a b 101 0 eng
010 ▼a 97045485
020 ▼a 354063696X (pbk. : alk. paper)
020 ▼a 9783540636960 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm37806278
035 ▼a (OCoLC)37806278
035 ▼a (KERIS)REF000004594467
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b I54135 1997
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I61i ▼c 1
111 2 ▼a International Conference on Information and Communications Security ▼n (1st : ▼d 1997 : ▼c Beijing, China)
245 1 0 ▼a Information and communications security : ▼b first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings / ▼c Yongfei Han, Tatsuaki Okamoto, Sihan Qing (eds.).
246 3 0 ▼a ICIS '97
246 1 8 ▼a ICICS '97
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1997.
300 ▼a x, 484 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1334
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Telecommunication systems ▼x Security measures ▼v Congresses.
700 1 ▼a Han, Yongfei.
700 1 ▼a Okamoto, Tatsuaki.
700 1 ▼a Qing, Sihan.
830 0 ▼a Lecture notes in computer science ; ▼v 1334.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I61i 1 등록번호 121186770 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.

New feature

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.


정보제공 : Aladin

목차


CONTENTS

Session 1 : Theoretical Foundations of Security

 Minimizing the use of random oracles in authenticated encryption schemes / Mihir Bellare ; Phillip Rohaway = 1

 Zero-knowledge proofs of decision power : new protocols and optimal round-complexity / Giovanni Di Crescenzo ; Kouichi Sakurai ; Moti Yung = 17

 Computational learning theoretic cryptanalysis of language theoretic cryptosystems / Takeshi Koshiba = 28

 A language for specifying sequences of authorization transformations and its applications / Yun Bai ; Vijay Varadgarajan = 39

Session 2 : Secret Sharing

 On the decomposition constructions for perfect secret sharing schemes / Hung-Min Sun k Bor-Liang Chen = 50

 Traceable visual cryptography / Ingrid Bidhl ; Susanne Wetzel = 61

 Remarks on the Multiple assignment secret sharing scheme / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini = 72

 Secret sharing in hierarchical groups / Chris Charnes ; Keith Martin ; Josef Pieprzyk ; Rei Safavi-Naini = 61

Session 3 : Network Security

 Stateless connections / Tuomas Aura ; Pekka Nikander = 87

 Design of a security platform for CORBA based application / Rakman Choi ; Jungchan Na ; Kwonil Lee ; Eunmi Kim k Wooyong Han = 98

 Secure document management and distribution in an open network environment / Antonio Lioy ; Fabio Maino ; Marco Mezzalama = 109

Session 4 : Authentication and Identification

 A^2-code = Affine resolvable + BIBD / Satoshi Obana ; Kaoru Kurosawa = 118

 Multisender authentication systems with unconditional security / K. M. Martin ; Rei Safavi-Naini = 130

 Proposal of user identification scheme using mouse / Kenichi Hayashi ; Eiji Okamoto / Masahiro Mambo = 144

Session 5 : Boolean functions and Stream Ciphers

 An effective genetic algorithm for finding highly nonlinear Boolean Functions / William Millan ; Andrew Ckark ; Ed Dawson = 149

 Duality of Boolean functions and its cryptographic significance / Xiao-Mo Zhang ; Yuliang Zheng ; Hideki Imai = 159

 Construction of correlation immune Boolean functions / Ed Dawson ; Chuan-Kun Wu = 170

 An improved key stream generator based on the programmable cellular automata / Miodrag J. Mihaljivi$$c'$$ = 181

Session 6 : Security Evaluation

 A Trust policy framework / Audum Jøsang = 192

 Critical analysis of security in voice hiding techniques / Liwu Chang ; Ira S. Moskowitz = 203

Session 7 : Signatures

 Two efficient RSA multisignature schemes / Sangjoon Park ; Sangwoo Park ; Kwangjo Kim ; Dongho Won = 217

 Proxy signatures, Revisited / Seungjoo Kim ; Sangjoon Park k Dongho Won = 223

Session 8 : Block Ciphers

 Related-key cryptanalysis of 3-WAY, Bigam-DES, CAST, DES-X NewDES, RC2, and TEA / John Kelsey ; Bruce Schneier ; David Wagner = 233

 A multiplication-addition structure against differential attack / Feng Zhu and Bao-An Guo = 247

 On strict estimation method of provable security against differential / Yasuyoshi Kaneko ; Shiho Moriai ; Kazuo Ohta = 258

 Improved fast software implementation of block ciphers / Takeshi Shimoyama ; Seiichi Amada ; Shiho Moriai = 269

 Security comments on the Hwang-Chen algebraic-code cryptosystem / Mohssen M. Alabbadi = 274

Session 9 : Public Key System Ⅰ

 Efficient elliptic curve exponentiation / Atsuko Miyaji ; Takatoshi Ono ; Henri Cohen = 282

 Efficient construction of secure hyperelliptic discrete logarithm problems / Jinhui Chao ; Nori Matsuda ; Shigeo Tsujii = 292

Session 10 : Cryptanalysis of Public Key Systems

 A new and optimal chosen-message attack on RSA-type cryptosystems / Daniel Bleichenbache ; Marc Joye ; Jean-Jacques Quisquater = 302

 On weak RSA-keys produced from Pretty Good Privacy / Yasuyuki Sakai ; Kouichi Sakurai ; Iiirokazu Ishizuka = 314

Session 11 : Subliminal Channels

 Self-synchronized message randomization methods for subliminal channels / Kazukuni Kobara ; Hideki Imai = 325

 Hiding the Hidden : A software system for concealing ciphertext as innocuous text / Mark Chapman ; George Davida = 335

Session 12 : Public Key Sysems Ⅱ

 Digital signature and public key cryptosystem in a prime order subgroup of Zn* / Colin Boyd = 346

 Trapdoor one-way permutations and multivariate polynomials / Jacques Patarin ; Louis Goubin = 356

 On the powerline system / Paul Camion and Herv$$e'$$ Chabanne = 381

Session 13 : Key Recovery / Fair Cryptosystem

 Making unfair a "fair" blind signature scheme / Jacques Traor$$e'$$ = 386

 Enforcing traceability in software / Colin Boyd = 398

 Publicly verifiable partial key escrow / Wenbo Mao = 409

Session 14 : Intellectual Property Protection

 A secure code for recipient watermarking against conspiracy attacks by all users / Hajime Watanabe ; Tadao Kasami = 414

Session 15 : Protocols

 Protocols for issuing public-key certificates over the Internet / James W. Gray, Ⅲ ; Kin Fai Epsilon IP = 424

 Distributed cryptographic function application protocols / Andr$$e'$$ Postma ; Thijs Krol ; Egbert MolenKamp = 435

 Fault tolerant anonymous channel / Wakaha Ogata ; Kurosawa ; Kazue Sako ; Kazunori Takatani = 440

 An implementable scheme for secure delegation of computing and data / Josep Domingo - Ferrer ; Ricardo X ; Sanchez del Castillo = 445

Session 16 : Electronic Commerce

 Electronic commerce with secure intelligent trade agent / Jaco van der Merwe ; S. H. von Solms = 452

 Efficient scalable fair cash with off-line extortion prevention / Holger Peterson ; Guilaume Poupard = 463

 An anonymous and undeniable payment scheme / Liqun Chen ; Chris J. Mitchell = 478

Author Index = 483



관련분야 신착자료

Harvard Business Review (2025)