Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings
Vijay Varadharajan, Yi Mu
Springer, Nov 23, 1999 - Business & Economics - 325 pages
This book constitutes the refereed proceedings of the Second International Conference on Information and Communication Security, ICICS'99, held in Sydney, Australia in November 1999. The 24 revised full papers presented were carefully reviewed and selected from a total of 62 submissions. The book is divided in topical sections on cryptanalysis, language-based approaches to security, electronic commerce and secret sharing, digital signatures, security protocols, applications, cryptography, and complexity and security functions.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Language Based Approach to Security
Extending Erlang for safe mobile code execution
17 other sections not shown
Other editions - View all
access control system Advances in Cryptology algorithm Alice allows applications attack axiom batch bits capabilities ciphertext coins commitment Computer Science construction cryptographic Cryptology dealer decrypt DEDICA delegation denote digital signatures discrete logarithm EDIFACT efficient electronic cash encryption entities Erlang existential forgery factorization finite field GF(q GF(qv Hamming distance IEEE implementation input values integer joint signature scheme language Lemma linear LNCS log file matrix mod q modular exponentiations module modulo multiple node Notes in Computer objects oracle output participants password permissions plaintext plateaued function policies polynomial private key probability problem Proceedings proposed protocol prove proxy signature public key Public Key Infrastructure random RBAC representation s-boxes Schnorr signature Schnorr signature scheme secret sharing sends Shamir scheme shareholders signature system signer smart card Springer-Verlag structure subshares Theorem uniformly perfect valid vector Verifiable Secret Sharing verifier zero-knowledge proof