Skip to main content
  • Conference proceedings
  • © 1999

Information and Communication Security

Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1726)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 1999.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Keynote Speech

    1. International Cryptography

      • Doug McGowan
      Pages 1-1
  3. Cryptanalysis

    1. Reaction Attacks against Several Public-Key Cryptosystem

      • Chris Hall, Ian Goldberg, Bruce Schneier
      Pages 2-12
    2. Cryptanalysis of Some AES Candidate Algorithms

      • Wenling Wu, Bao Li, Denguo Feng, Sihan Qing
      Pages 13-21
  4. Language Based Approach to Security

    1. Issues in the Design of a Language for Role Based Access Control

      • Michael Hitchens, Vijay Varadharajan
      Pages 22-38
    2. Extending Erlang for Safe Mobile Code Execution

      • Lawrie Brown, Dan Sahlin
      Pages 39-53
  5. Electronic Commerce and Secret Sharing

    1. Detachable Electronic Coins

      • Chris Pavlovski, Colin Boyd, Ernest Foo
      Pages 54-70
    2. Linear Secret Sharing with Divisible Shares

      • Josef Pieprzyk
      Pages 71-86
  6. Digital Signatures

    1. Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications

      • Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan
      Pages 103-118
    2. Signature Scheme for Controlled Environments

      • Kapali Viswanathan, Colin Boyd, Ed Dawson
      Pages 119-134
    3. On the Cryptographic Value of the qth Root Problem

      • Cheryl L. Beaver, Peter S. Gemmell, Anna M. Johnston, William Neumann
      Pages 135-142
  7. Keynote Speech

    1. Protecting Critical Information Systems

      • Sushil Jajodia
      Pages 143-143
  8. Security Protocols

    1. Delegation Chains Secure Up to Constant Length

      • Masayuki Abe, Tatsuaki Okamoto
      Pages 144-156
    2. Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks

      • Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
      Pages 157-168
    3. An Extended Logic for Analyzing Timed-Release Public-Key Protocols

      • Michiharu Kudo, Anish Mathuria
      Pages 183-198
  9. Applications

    1. Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project

      • Montse Rubia, Juan Carlos Cruellas, Manel Medina
      Pages 199-215
    2. User Identification System Based on Biometrics for Keystroke

      • Kazumasa Omote, Eiji Okamoto
      Pages 216-229

Other Volumes

  1. Information and Communication Security

About this book

ICICS’99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer Society, IEEE Computer Chapter (NSW), and Harvey World Travel. I am g- teful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors and users of information security systems and technologies. A range of aspects was addressed from security theory and modeling to system and protocol designs and implementations to applications and management. The conference con- sted of a series of refereed technical papers and invited technical presentations. The program committee invited two distinguished key note speakers. The ?rst keynote speech by Doug McGowan, a Senior Manager from Hewlett-Packard, USA, discussed cryptography in an international setting. Doug described the current status of international cryptography and explored possible future trends and new technologies. The second keynote speech was delivered by Sushil Ja- dia of George Mason University, USA. Sushil’s talk addressed the protection of critical information systems. He discussed issues and methods for survivability of systems under malicious attacks and proposed a fault-tolerance based - proach. The conference also hosted a panel on the currently much debated topic of Internet censorship. The panel addressed the issue of censorship from various viewpoints namely legal, industrial, governmental and technical.

Editors and Affiliations

  • Macquarie University, Sydney, Australia

    Vijay Varadharajan

  • Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Australia

    Yi Mu

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access