Information Security

6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003. Proceedings

  • Colin Boyd
  • Wenbo Mao
Conference proceedings ISC 2003

DOI: 10.1007/b13828

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2851)

Table of contents (33 papers)

  1. Front Matter
  2. Invited Talk

    1. Revisiting Software Protection
      Paul C. van Oorschot
      Pages 1-13
  3. Network Security

    1. Enabling Shared Audit Data
      Adrian Baldwin, Simon Shiu
      Pages 14-28
    2. Single Sign-On Using Trusted Platforms
      Andreas Pashalidis, Chris J. Mitchell
      Pages 54-68
  4. Public-Key Algorithms

    1. Easy Verifiable Primitives and Practical Public Key Cryptosystems
      David Galindo, Sebastià Martín, Paz Morillo, Jorge L. Villar
      Pages 69-83
    2. Reactively Secure Signature Schemes
      Michael Backes, Birgit Pfitzmann, Michael Waidner
      Pages 84-95
    3. A Fast Signature Scheme Based on New On-line Computation
      Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto
      Pages 111-121
  5. Cryptographic Protocols

    1. Distributed RSA Signature Schemes for General Access Structures
      Javier Herranz, Carles Padró, Germán Sáez
      Pages 122-136
    2. Divisible Voting Scheme
      Natsuki Ishida, Shin’ichiro Matsuo, Wakaha Ogata
      Pages 137-150
    3. Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations
      Anderson C. A. Nascimento, Joern Mueller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
      Pages 151-164
    4. The Design and Implementation of Protocol-Based Hidden Key Recovery
      Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
      Pages 165-179
  6. Invited Talk

  7. Protocol Attacks

    1. On the Security of Fair Non-repudiation Protocols
      Sigrid Gürgens, Carsten Rudolph, Holger Vogt
      Pages 193-207
  8. Attacks on Public Key Algorithms

    1. Zero-Value Point Attacks on Elliptic Curve Cryptosystem
      Toru Akishita, Tsuyoshi Takagi
      Pages 218-233
    2. Analysis of the Insecurity of ECMQV with Partially Known Nonces
      Peter J. Leadbitter, Nigel P. Smart
      Pages 240-251

About these proceedings

Introduction

The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.

Keywords

PKI infrastructure algorithms authentication data security digital payment systems digital rights management e-commerce information information hiding information security network security privacy security systems security watermarking

Editors and affiliations

  • Colin Boyd
    • 1
  • Wenbo Mao
    • 2
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia
  2. 2.Hewlett-Packard LaboratoriesBristolUK

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20176-2
  • Online ISBN 978-3-540-39981-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349