HOME > 상세정보

상세정보

Information and communication security : second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings

Information and communication security : second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings

자료유형
단행본
개인저자
Varadharajan, Vijay. Mu, Yi, 1955-.
서명 / 저자사항
Information and communication security : second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / Vijay Varadharajan, Yi Mu, Eds.
발행사항
Berlin   New York :   Springer,   c1999.  
형태사항
xi, 323 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1726
ISBN
3540666826 (pbk. : alk. paper) 9783540666820 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Telecommunication systems -- Security measures -- Congresses.
000 01549camuu2200373 a 4500
001 000001049564
005 20091120105756
008 991005s1999 gw a b 001 0 eng
010 ▼a 99049196
015 ▼a GB99-81942
020 ▼a 3540666826 (pbk. : alk. paper)
020 ▼a 9783540666820 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm42619587
035 ▼a (OCoLC)42619587
040 ▼a DLC ▼c DLC ▼d C#P ▼d OHX ▼d UKM ▼d 244002 ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I554 1999
072 7 ▼a QA ▼2 lcco
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I61i ▼c 2
111 2 ▼a International Conference on Information and Communications Security ▼n (2nd : ▼d 1999 : ▼c Sydney, N.S.W.)
245 1 0 ▼a Information and communication security : ▼b second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999 : proceedings / ▼c Vijay Varadharajan, Yi Mu, Eds.
246 3 0 ▼a ICICS'99
260 ▼a Berlin ▼a New York : ▼b Springer, ▼c c1999.
300 ▼a xi, 323 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1726
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Telecommunication systems ▼x Security measures ▼v Congresses.
700 1 ▼a Varadharajan, Vijay.
700 1 ▼a Mu, Yi, ▼d 1955-.
830 0 ▼a Lecture notes in computer science ; ▼v 1726.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I61i 2 등록번호 121186672 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 세종학술정보원/과학기술실/ 청구기호 005.8 I61i 2 등록번호 151081551 도서상태 대출가능 반납예정일 예약 서비스
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I61i 2 등록번호 121186672 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실/ 청구기호 005.8 I61i 2 등록번호 151081551 도서상태 대출가능 반납예정일 예약 서비스

컨텐츠정보

목차


CONTENTS

Keynote Speech

 International Cryptography / Doug McGowan = 1

Cryptanalysis

 Reaction attacks against several public key cryptosystems / C. Hall, I. Goldberg ; B. Schneier = 2

 Cryptanalysis of some AES candidate algorithms / W. Wu ; B. Li ; D. Feng ; S. Qing = 13

Language Based Approach to Security

 Issues in the design of a language for role based access control / M. Hitchens ; V. Varadharajan = 22

 Extending Erlang for safe mobile code execution / L. Brown ; D. Sahlin = 39

Electronic Commerce and Secret Sharing

 Detachable electronic coins / C. Pavlovski ; C. Boyd ; E. Foo = 54

 Linear secret sharing with divisible shares / J. Pieprzyk = 71

 Efficient publicly verifiable secret sharing schemes with fast or delayed recovery / F. Boudot ; J. Traor$$e'$$ = 87

Digital Signatures

 Zero-knowledge proofs of possession of EIGamal-like digital signatures and its applications / K. Q. Nguyen ; F. Bao ; Y. Mu ; V. Varadharajan = 103

 Signature scheme for controlled environments / K. Viswanathan ; C. Boyd ; E. Dawson = 119

 On the cryptographic value of the Qth root problem / C. L. Beaver ; P. S. Gemmell ; A. M. Johnston ; W. Neumann = 135

Keynote Speech

 Protecting Critical Information Systems / Sushil Jajodia = 143

Security Protocols

 Delegation chains secure up to constant length / M. Abe ; T. Okamoto = 144

 Optimal construction of unconditionally secured ID-based key sharing scheme for large-scale networks / G. Hanaoka ; T. Nishioka ; Y. Zheng ; H. Imai = 157

 Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack / S. Hirose ; K. Matsuura = 169

 An extended logic for analyzing timed-release public-key protocols / M. Kudo ; A. Mathuria = 183

Applications

 Bringing together X. 509 and EDIFACT public key infrastructures : The DEDICA project / M. Rubia ; J. C. Cruellas ; M. Medina = 199

 User identification system based on biometrics for keystroke / K. Omote ; E. Okamoto = 216

 Boundary conditions that influence decisions about log file formats in multi-applicatin smart cards / C. Markantonakis = 230

 Sending message into a definite future / W. Mao = 244

Cryptography

 Efficient accumulators without trapdoor / T. Sander = 252

 Evolutionalry heuristics for finding cryptographically strong S-Boxes / W. Millan ; L. Burnett ; G. Garter ; A. Clark ; E. Dawson = 263

 Incremental authentication of tree - structured documents / P. Ekdahl and B. Smeets = 275

Complexity and Security Functions

 Plateaued Functions / Y. Zheng ; X. - M. Zhang = 284

 On the linear complexty of the Naor-Reingold pseudo-random function / F. Griffin ; I. E. Shparlinski = 301

 On the channel capacity of narrow-band subliminal channels / K. Kobara ; H. Imai = 309

Author Index = 325



관련분야 신착자료