Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings
Vijay Varadharajan, Yi Mu
Springer, Nov 23, 1999 - Business & Economics - 325 pages
This book constitutes the refereed proceedings of the Second International Conference on Information and Communication Security, ICICS'99, held in Sydney, Australia in November 1999. The 24 revised full papers presented were carefully reviewed and selected from a total of 62 submissions. The book is divided in topical sections on cryptanalysis, language-based approaches to security, electronic commerce and secret sharing, digital signatures, security protocols, applications, cryptography, and complexity and security functions.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Cryptanalysis of some AES candidate algorithms
Extending Erlang for safe mobile code execution
Electronic Commerce and Secret Sharing
5 other sections not shown
Other editions - View all
access control Advances in Cryptology algorithm Alice application attack authentication axiom batch bits channel capacity ciphertext coins Computer Science construction CRYPTO cryptographic Cryptology cryptosystems data entry database decrypt DEDICA gateway delegation chain denote digital signatures discrete logarithm EDIFACT EDIFACT certificate efficient electronic cash encryption entities Erlang example factorization function on Vn GF(q GF(qv Hamming distance hash function identify IEEE implementation input values integer Lecture Notes Lemma linear LNCS log file matrix mod q modular exponentiations module modulo multiple node nonlinearity Notes in Computer output password plateaued function polynomial private key probability problem Proceedings proof proposed protocol prove public key Public Key Infrastructure qth root RBAC role RSA-UFO s-boxes Schnorr signature secret sharing sends signature system signer smart card Springer-Verlag structure subshares Theorem valid vector Verifiable Secret Sharing verifier X.509 certificate zero-knowledge zero-knowledge proof