Information and Communication Security

Second International Conference, ICICS’99, Sydney, Australia, November 9-11, 1999. Proceedings

  • Vijay Varadharajan
  • Yi Mu
Conference proceedings ICICS 1999

DOI: 10.1007/b72329

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1726)

Table of contents (26 papers)

  1. Front Matter
  2. Keynote Speech

    1. International Cryptography
      Doug McGowan
      Pages 1-1
  3. Cryptanalysis

    1. Reaction Attacks against Several Public-Key Cryptosystem
      Chris Hall, Ian Goldberg, Bruce Schneier
      Pages 2-12
    2. Cryptanalysis of Some AES Candidate Algorithms
      Wenling Wu, Bao Li, Denguo Feng, Sihan Qing
      Pages 13-21
  4. Language Based Approach to Security

    1. Issues in the Design of a Language for Role Based Access Control
      Michael Hitchens, Vijay Varadharajan
      Pages 22-38
    2. Extending Erlang for Safe Mobile Code Execution
      Lawrie Brown, Dan Sahlin
      Pages 39-53
  5. Electronic Commerce and Secret Sharing

    1. Detachable Electronic Coins
      Chris Pavlovski, Colin Boyd, Ernest Foo
      Pages 54-70
    2. Linear Secret Sharing with Divisible Shares
      Josef Pieprzyk
      Pages 71-86
  6. Digital Signatures

    1. Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications
      Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan
      Pages 103-118
    2. Signature Scheme for Controlled Environments
      Kapali Viswanathan, Colin Boyd, Ed Dawson
      Pages 119-134
    3. On the Cryptographic Value of the qth Root Problem
      Cheryl L. Beaver, Peter S. Gemmell, Anna M. Johnston, William Neumann
      Pages 135-142
  7. Keynote Speech

    1. Protecting Critical Information Systems
      Sushil Jajodia
      Pages 143-143
  8. Security Protocols

    1. Delegation Chains Secure Up to Constant Length
      Masayuki Abe, Tatsuaki Okamoto
      Pages 144-156
    2. Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks
      Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
      Pages 157-168
    3. An Extended Logic for Analyzing Timed-Release Public-Key Protocols
      Michiharu Kudo, Anish Mathuria
      Pages 183-198
  9. Applications

About these proceedings


ICICS’99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer Society, IEEE Computer Chapter (NSW), and Harvey World Travel. I am g- teful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors and users of information security systems and technologies. A range of aspects was addressed from security theory and modeling to system and protocol designs and implementations to applications and management. The conference con- sted of a series of refereed technical papers and invited technical presentations. The program committee invited two distinguished key note speakers. The ?rst keynote speech by Doug McGowan, a Senior Manager from Hewlett-Packard, USA, discussed cryptography in an international setting. Doug described the current status of international cryptography and explored possible future trends and new technologies. The second keynote speech was delivered by Sushil Ja- dia of George Mason University, USA. Sushil’s talk addressed the protection of critical information systems. He discussed issues and methods for survivability of systems under malicious attacks and proposed a fault-tolerance based - proach. The conference also hosted a panel on the currently much debated topic of Internet censorship. The panel addressed the issue of censorship from various viewpoints namely legal, industrial, governmental and technical.


Cryptology Data Security Electronic Commerce Information Security Network Security Privacy Secure Communications communication complexity cryptography information

Editors and affiliations

  • Vijay Varadharajan
    • 1
  • Yi Mu
    • 2
  1. 1.Macquarie UniversitySydneyAustralia
  2. 2.Centre for Computer and Information Security Research School of Computer Science and Software EngineeringUniversity of WollongongAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1999
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-66682-0
  • Online ISBN 978-3-540-47942-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349