Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, ProceedingsSpringer Science & Business Media, 1997. gada 22. okt. - 484 lappuses This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997. The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce. |
No grāmatas satura
1.–5. rezultāts no 35.
12. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
13. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
59. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
60. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
80. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
Theoretical Foundations of Security Minimizing the use of random oracles in authenticated encryption schemes | 1 |
new protocols and optimal roundcomplexity | 17 |
Computational learning theoretic cryptanalysis of language theoretic cryptosystems | 28 |
A language for specifying sequences of authorization transformations and its applications | 39 |
Secret Sharing | 50 |
Traceable visual cryptography | 61 |
Remarks on the multiple assignment secret sharing scheme | 72 |
Secret sharing in hierarchical groups | 81 |
Extended Abstract | 269 |
Security comments on the HwangChen algebraiccode cryptosystem | 274 |
Public Key Sysmems I | 282 |
Efficient construction of secure hyperelliptic discrete logarithm problems | 291 |
Cryphanalysis of Public Key Systems | 302 |
On weak RSAkeys produced from Pretty Good Privacy | 314 |
Subliminal Channels | 325 |
A software system for concealing ciphertext as innocuous text | 335 |
Network Security | 87 |
Design of a security platform for CORBA based application | 98 |
Secure document management and distribution in an open network environment | 109 |
Authentication and Identification | 118 |
Multisender authentication systems with unconditional security | 130 |
Proposal of user identification scheme using mouse | 144 |
Boolean Functions and Stream Ciphers | 149 |
Duality of Boolean functions and its cryptographic significance | 159 |
Construction of correlation immune Boolean functions | 170 |
An improved key stream generator based on the programmable cellular automata | 181 |
Security Evaluation | 192 |
Critical analysis of security in voice hiding techniques | 203 |
Signatures | 217 |
Proxy signatures Revisited | 223 |
Block Ciphers | 233 |
A multiplicationaddition structure against differential attack | 247 |
On strict estimation method of provable security against differential | 258 |
Public Key System II | 346 |
Trapdoor oneway permutations and multivariate polynomials | 356 |
Asymmetric cryptography with SBoxes | 369 |
On the powerline system | 381 |
Key RecoveryFair Cryptosystem | 386 |
Enforcing traceability in software | 398 |
Publicly verifiable partial key escrow | 409 |
Intellectual Property Protection | 414 |
Protocols | 424 |
Distributed cryptographic function application protocols | 435 |
Fault tolerant anonymous channel | 440 |
An Implementable Scheme for Secure Delegation of Computing and Data | 445 |
Electronic Commerce | 452 |
Efficient scalable fair cash with offline extortion prevention | 463 |
An anonymous and undeniable payment scheme | 478 |
483 | |
Bieži izmantoti vārdi un frāzes
A-code access structure Advances in Cryptology algebraic algorithm applications assume attack authentication binary blind signature block Boolean functions cipher ciphertext client codeword coin Computer Science construction context-free languages cryptographic cryptosystems decryption defined delegation denote DES-like differential cryptanalysis distributed ElGamal elliptic curve encryption finite field graph Hamming weight hash function hidden data hyperelliptic curves IEEE implementation input integer Jacobian key escrow Lecture Notes Lemma linear matrix method modulus nonlinearity Notes in Computer obtain output P₁ pair permutation plaintext polynomial private key probability proof proposed protocol proxy signature public key random number random oracle related-key related-key attacks round function S-boxes secret key secret sharing scheme sequence server SGA-system Shamir signature scheme signer Springer-Verlag stateless string subset Theorem transformation trust variables vector verify visual cryptography zero-knowledge proof