default search action
2. ICICS 1999: Sydney, Australia
- Vijay Varadharajan, Yi Mu:
Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings. Lecture Notes in Computer Science 1726, Springer 1999, ISBN 3-540-66682-6
Keynote Speech
- Doug McGowan:
International Cryptography (Abstract). 1
Cryptanalysis
- Chris Hall, Ian Goldberg, Bruce Schneier:
Reaction Attacks against several Public-Key Cryptosystems. 2-12 - Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing:
Cryptanalysis of some AES Candidate Algorithms. 13-21
Language Based Approach to Security
- Michael Hitchens, Vijay Varadharajan:
Issues in the Design of a Language for Role Based Access Control. 22-38 - Lawrie Brown, Dan Sahlin:
Extending ERLANG for Safe Mobile Code Execution. 39-53
Electronic Commerce and Secret Sharing
- Chris Pavlovski, Colin Boyd, Ernest Foo:
Detachable Electronic Coins. 54-70 - Josef Pieprzyk:
Linear Secret Sharing with Divisible Shares. 71-86 - Fabrice Boudot, Jacques Traoré:
Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery. 87-102
Digital Signatures
- Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan:
Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. 103-118 - Kapali Viswanathan, Colin Boyd, Ed Dawson:
Signature Scheme for Controlled Environments. 119-134 - Cheryl L. Beaver, Peter Gemmell, Anna M. Johnston, William D. Neumann:
On the Cryptographic Value of The qth Root Problem. 135-142
Keynote Speech
- Sushil Jajodia:
Protecting Critical Information Systems (Abstract). 143
Security Protocols
- Masayuki Abe, Tatsuaki Okamoto:
Delegation Chains Secure up to Constant Length. 144-156 - Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. 157-168 - Shoichi Hirose, Kanta Matsuura:
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack. 169-182 - Michiharu Kudo, Anish Mathuria:
An Extended Logic for Analyzing Timed-Release Public-Key Protocols. 183-198
Applications
- Montse Rubia, Juan Carlos Cruellas, Manuel Medina:
Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. 199-215 - Kazumasa Omote, Eiji Okamoto:
User Identification System Based on Biometrics for Keystroke. 216-229 - Constantinos Markantonakis:
Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards. 230-243 - Wenbo Mao:
Send Message into a Definite Future. 244-251
Cryptography
- Tomas Sander:
Efficient Accumulators without Trapdoor Extended Abstracts. 252-262 - William Millan, L. Burnett, Gary Carter, Andrew J. Clark, Ed Dawson:
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. 263-274 - Patrik Ekdahl, Ben J. M. Smeets:
Incremental Authentication of Tree-Structured Documents. 275-283
Complexity and Security Functions
- Yuliang Zheng, Xian-Mo Zhang:
Plateaued Functions. 284-300 - Frances Griffin, Igor E. Shparlinski:
On the Linear Complexity of the Naor-Reingold Pseudo-Random Function. 301-308 - Kazukuni Kobara, Hideki Imai:
On the Channel Capacity of Narrow-Band Subliminal Channels. 309-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.