Information Security

4th International Conference, ISC 2001 Malaga, Spain, October 1–3, 2001 Proceedings

  • George I. Davida
  • Yair Frankel
Conference proceedings ISC 2001

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2200)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Key Distribution

    1. Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky
      Pages 18-26
  3. Protocols

    1. Giovanni Di Crescenzo, Olga Kornievskaia
      Pages 27-45
  4. Enhancing Technologies

    1. Carlo Blundo, Paolo D’Arco, Alfredo De Santis, Clemente Galdi
      Pages 63-80
    2. Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi
      Pages 81-94
  5. Privacy

    1. Dmitri Asonov, Markus Schaal, Johann-Christoph Freytag
      Pages 95-109
    2. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
      Pages 110-124
  6. Software Protection

    1. Enriquillo Valdez, Moti Yung
      Pages 125-143
    2. Stanley Chow, Yuan Gu, Harold Johnson, Vladimir A. Zakharov
      Pages 144-155
  7. Message Hiding I

    1. Mark Chapman, George I. Davida, Marc Rennhard
      Pages 156-165
    2. David Sánchez, Agustín Orfila, Julio César Hernández, José María Sierra
      Pages 166-182
  8. PKI Issues and Protocols

    1. Diana Berbecaru, Antonio Lioy, Marius Marian
      Pages 183-203
    2. Apol⁗ònia Martínez-Nadal, Josep L. Ferrer-Gomila
      Pages 204-219
  9. Hardware Implementations

    1. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro
      Pages 235-247
    2. Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi
      Pages 248-265
  10. Cryptanalysis and Prevention

    1. Rainer Steinwandt, Willi Geiselmann, Thomas Beth
      Pages 280-293

About these proceedings


The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Málaga, Spain, on October 1–3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier López and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their contribution to the success of the conference. José M. Troya was the Conference Chair. The General Co chairs were assisted with local arrangements by Antonio Maña, Carlos Maraval, Juan J. Ortega, José M. Sierra, and Miguel Soriano. This was the first year that the conference accepted electronic submissions. Many thanks to Dawn Gibson for assisting in developing and maintaining the electronic submission servers. The conference received 98 submissions of which 37 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the contents of their papers. The Program Committee consisted of Elisa Bertino, Università di Milano; G. R.


Authentication Cryptographic Protocols Digital Payment Systems E-Commerce Information Hiding Information Security Network Security PKI Infrastructure Secure Communications Systems Security data security information privacy security

Editors and affiliations

  • George I. Davida
    • 1
  • Yair Frankel
    • 2
  1. 1.Department of EECSUniversity of Wisconsin-MilwaukeeMilwaukeeUSA
  2. 2.Techtegrity, LLCWestfieldUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-42662-2
  • Online ISBN 978-3-540-45439-7
  • Series Print ISSN 0302-9743
  • About this book