Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings

Pirmais vāks
Springer Science & Business Media, 1997. gada 22. okt. - 484 lappuses
This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.

No grāmatas satura

Atlasītās lappuses

Saturs

Theoretical Foundations of Security Minimizing the use of random oracles in authenticated encryption schemes
1
new protocols and optimal roundcomplexity
17
Computational learning theoretic cryptanalysis of language theoretic cryptosystems
28
A language for specifying sequences of authorization transformations and its applications
39
Secret Sharing
50
Traceable visual cryptography
61
Remarks on the multiple assignment secret sharing scheme
72
Secret sharing in hierarchical groups
81
Extended Abstract
269
Security comments on the HwangChen algebraiccode cryptosystem
274
Public Key Sysmems I
282
Efficient construction of secure hyperelliptic discrete logarithm problems
291
Cryphanalysis of Public Key Systems
302
On weak RSAkeys produced from Pretty Good Privacy
314
Subliminal Channels
325
A software system for concealing ciphertext as innocuous text
335

Network Security
87
Design of a security platform for CORBA based application
98
Secure document management and distribution in an open network environment
109
Authentication and Identification
118
Multisender authentication systems with unconditional security
130
Proposal of user identification scheme using mouse
144
Boolean Functions and Stream Ciphers
149
Duality of Boolean functions and its cryptographic significance
159
Construction of correlation immune Boolean functions
170
An improved key stream generator based on the programmable cellular automata
181
Security Evaluation
192
Critical analysis of security in voice hiding techniques
203
Signatures
217
Proxy signatures Revisited
223
Block Ciphers
233
A multiplicationaddition structure against differential attack
247
On strict estimation method of provable security against differential
258
Public Key System II
346
Trapdoor oneway permutations and multivariate polynomials
356
Asymmetric cryptography with SBoxes
369
On the powerline system
381
Key RecoveryFair Cryptosystem
386
Enforcing traceability in software
398
Publicly verifiable partial key escrow
409
Intellectual Property Protection
414
Protocols
424
Distributed cryptographic function application protocols
435
Fault tolerant anonymous channel
440
An Implementable Scheme for Secure Delegation of Computing and Data
445
Electronic Commerce
452
Efficient scalable fair cash with offline extortion prevention
463
An anonymous and undeniable payment scheme
478
Author Index
483
Autortiesības

Bieži izmantoti vārdi un frāzes

Bibliogrāfiskā informācija