Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
| 000 | 01613camuu2200385 a 4500 | |
| 001 | 000045561996 | |
| 005 | 20091126164303 | |
| 008 | 971009s1997 gw a b 101 0 eng | |
| 010 | ▼a 97045485 | |
| 020 | ▼a 354063696X (pbk. : alk. paper) | |
| 020 | ▼a 9783540636960 (pbk. : alk. paper) | |
| 035 | ▼a (OCoLC)ocm37806278 | |
| 035 | ▼a (OCoLC)37806278 | |
| 035 | ▼a (KERIS)REF000004594467 | |
| 040 | ▼a DLC ▼c DLC ▼d DLC ▼d 211009 | |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b I54135 1997 |
| 082 | 0 4 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b I61i ▼c 1 | |
| 111 | 2 | ▼a International Conference on Information and Communications Security ▼n (1st : ▼d 1997 : ▼c Beijing, China) |
| 245 | 1 0 | ▼a Information and communications security : ▼b first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings / ▼c Yongfei Han, Tatsuaki Okamoto, Sihan Qing (eds.). |
| 246 | 3 0 | ▼a ICIS '97 |
| 246 | 1 8 | ▼a ICICS '97 |
| 260 | ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1997. | |
| 300 | ▼a x, 484 p. : ▼b ill. ; ▼c 24 cm. | |
| 490 | 1 | ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1334 |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer security ▼v Congresses. |
| 650 | 0 | ▼a Telecommunication systems ▼x Security measures ▼v Congresses. |
| 700 | 1 | ▼a Han, Yongfei. |
| 700 | 1 | ▼a Okamoto, Tatsuaki. |
| 700 | 1 | ▼a Qing, Sihan. |
| 830 | 0 | ▼a Lecture notes in computer science ; ▼v 1334. |
| 945 | ▼a KINS |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 I61i 1 | 등록번호 121186770 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.
New feature
This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.
정보제공 :
목차
CONTENTS Session 1 : Theoretical Foundations of Security Minimizing the use of random oracles in authenticated encryption schemes / Mihir Bellare ; Phillip Rohaway = 1 Zero-knowledge proofs of decision power : new protocols and optimal round-complexity / Giovanni Di Crescenzo ; Kouichi Sakurai ; Moti Yung = 17 Computational learning theoretic cryptanalysis of language theoretic cryptosystems / Takeshi Koshiba = 28 A language for specifying sequences of authorization transformations and its applications / Yun Bai ; Vijay Varadgarajan = 39 Session 2 : Secret Sharing On the decomposition constructions for perfect secret sharing schemes / Hung-Min Sun k Bor-Liang Chen = 50 Traceable visual cryptography / Ingrid Bidhl ; Susanne Wetzel = 61 Remarks on the Multiple assignment secret sharing scheme / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini = 72 Secret sharing in hierarchical groups / Chris Charnes ; Keith Martin ; Josef Pieprzyk ; Rei Safavi-Naini = 61 Session 3 : Network Security Stateless connections / Tuomas Aura ; Pekka Nikander = 87 Design of a security platform for CORBA based application / Rakman Choi ; Jungchan Na ; Kwonil Lee ; Eunmi Kim k Wooyong Han = 98 Secure document management and distribution in an open network environment / Antonio Lioy ; Fabio Maino ; Marco Mezzalama = 109 Session 4 : Authentication and Identification A^2-code = Affine resolvable + BIBD / Satoshi Obana ; Kaoru Kurosawa = 118 Multisender authentication systems with unconditional security / K. M. Martin ; Rei Safavi-Naini = 130 Proposal of user identification scheme using mouse / Kenichi Hayashi ; Eiji Okamoto / Masahiro Mambo = 144 Session 5 : Boolean functions and Stream Ciphers An effective genetic algorithm for finding highly nonlinear Boolean Functions / William Millan ; Andrew Ckark ; Ed Dawson = 149 Duality of Boolean functions and its cryptographic significance / Xiao-Mo Zhang ; Yuliang Zheng ; Hideki Imai = 159 Construction of correlation immune Boolean functions / Ed Dawson ; Chuan-Kun Wu = 170 An improved key stream generator based on the programmable cellular automata / Miodrag J. Mihaljivi$$c'$$ = 181 Session 6 : Security Evaluation A Trust policy framework / Audum Jøsang = 192 Critical analysis of security in voice hiding techniques / Liwu Chang ; Ira S. Moskowitz = 203 Session 7 : Signatures Two efficient RSA multisignature schemes / Sangjoon Park ; Sangwoo Park ; Kwangjo Kim ; Dongho Won = 217 Proxy signatures, Revisited / Seungjoo Kim ; Sangjoon Park k Dongho Won = 223 Session 8 : Block Ciphers Related-key cryptanalysis of 3-WAY, Bigam-DES, CAST, DES-X NewDES, RC2, and TEA / John Kelsey ; Bruce Schneier ; David Wagner = 233 A multiplication-addition structure against differential attack / Feng Zhu and Bao-An Guo = 247 On strict estimation method of provable security against differential / Yasuyoshi Kaneko ; Shiho Moriai ; Kazuo Ohta = 258 Improved fast software implementation of block ciphers / Takeshi Shimoyama ; Seiichi Amada ; Shiho Moriai = 269 Security comments on the Hwang-Chen algebraic-code cryptosystem / Mohssen M. Alabbadi = 274 Session 9 : Public Key System Ⅰ Efficient elliptic curve exponentiation / Atsuko Miyaji ; Takatoshi Ono ; Henri Cohen = 282 Efficient construction of secure hyperelliptic discrete logarithm problems / Jinhui Chao ; Nori Matsuda ; Shigeo Tsujii = 292 Session 10 : Cryptanalysis of Public Key Systems A new and optimal chosen-message attack on RSA-type cryptosystems / Daniel Bleichenbache ; Marc Joye ; Jean-Jacques Quisquater = 302 On weak RSA-keys produced from Pretty Good Privacy / Yasuyuki Sakai ; Kouichi Sakurai ; Iiirokazu Ishizuka = 314 Session 11 : Subliminal Channels Self-synchronized message randomization methods for subliminal channels / Kazukuni Kobara ; Hideki Imai = 325 Hiding the Hidden : A software system for concealing ciphertext as innocuous text / Mark Chapman ; George Davida = 335 Session 12 : Public Key Sysems Ⅱ Digital signature and public key cryptosystem in a prime order subgroup of Zn* / Colin Boyd = 346 Trapdoor one-way permutations and multivariate polynomials / Jacques Patarin ; Louis Goubin = 356 On the powerline system / Paul Camion and Herv$$e'$$ Chabanne = 381 Session 13 : Key Recovery / Fair Cryptosystem Making unfair a "fair" blind signature scheme / Jacques Traor$$e'$$ = 386 Enforcing traceability in software / Colin Boyd = 398 Publicly verifiable partial key escrow / Wenbo Mao = 409 Session 14 : Intellectual Property Protection A secure code for recipient watermarking against conspiracy attacks by all users / Hajime Watanabe ; Tadao Kasami = 414 Session 15 : Protocols Protocols for issuing public-key certificates over the Internet / James W. Gray, Ⅲ ; Kin Fai Epsilon IP = 424 Distributed cryptographic function application protocols / Andr$$e'$$ Postma ; Thijs Krol ; Egbert MolenKamp = 435 Fault tolerant anonymous channel / Wakaha Ogata ; Kurosawa ; Kazue Sako ; Kazunori Takatani = 440 An implementable scheme for secure delegation of computing and data / Josep Domingo - Ferrer ; Ricardo X ; Sanchez del Castillo = 445 Session 16 : Electronic Commerce Electronic commerce with secure intelligent trade agent / Jaco van der Merwe ; S. H. von Solms = 452 Efficient scalable fair cash with off-line extortion prevention / Holger Peterson ; Guilaume Poupard = 463 An anonymous and undeniable payment scheme / Liqun Chen ; Chris J. Mitchell = 478 Author Index = 483
