Table of contents

  1. Front Matter
  2. Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko
    Pages 32-42
  3. Hidema Tanaka, Toinoya Ohishi, Toshinobu Kaneko
    Pages 43-54
  4. R. Balasubramanian, S. V. Nagaraj
    Pages 66-74
  5. Hidenori Kuwakado, Hatsukazu Tanaka
    Pages 75-81
  6. Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi
    Pages 82-95
  7. Daisuke Nakamura, Kunikatsu Kobayashi
    Pages 96-108
  8. Kazuo Ohta
    Pages 109-115
  9. George Davida, René Peralta
    Pages 116-120
  10. John Kelsey, Bruce Schneier, Chris Hall, David Wagner
    Pages 121-134
  11. Yoshiki Sameshima
    Pages 135-146
  12. Kouichi Sakuraii, Yoshinori Yamane, Shingo Miyazaki, Tohru Inoue
    Pages 147-157
  13. A. Satoh, Y. Kobayashi, H. Niijima, N. Ooba, S. Munetoh, S. Sone
    Pages 174-187
  14. Kenji Koyama, Routo Terada
    Pages 198-208
  15. X. Yi, K. Y. Lam, S. X. Cheng, X. H. You
    Pages 209-220
  16. Mihir Bellare
    Pages 221-231

About these proceedings


This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in September 1997. The volume presents six invited surveys together with 25 thoroughly revised full papers selected from 39 submissions. Among the topics covered are public-key cryptosystems, cryptoanalysis, digital signatures, hardware/software implementation, key management, key sharing, security management, electronic commerce, and quantum cryptology.


Algorithms Automat Hardware Public Key Smart Card automata communication cryptography data security information operating system privacy real-time security

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-64382-1
  • Online ISBN 978-3-540-69767-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book