Information Security

6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003. Proceedings

  • Colin Boyd
  • Wenbo Mao
Conference proceedings ISC 2003

DOI: 10.1007/b13828

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2851)

Table of contents

  1. Front Matter
  2. Invited Talk

    1. Paul C. van Oorschot
      Pages 1-13
  3. Network Security

    1. Adrian Baldwin, Simon Shiu
      Pages 14-28
    2. Andreas Pashalidis, Chris J. Mitchell
      Pages 54-68
  4. Public-Key Algorithms

    1. David Galindo, Sebastià Martín, Paz Morillo, Jorge L. Villar
      Pages 69-83
    2. Michael Backes, Birgit Pfitzmann, Michael Waidner
      Pages 84-95
    3. Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto
      Pages 111-121
  5. Cryptographic Protocols

    1. Javier Herranz, Carles Padró, Germán Sáez
      Pages 122-136
    2. Natsuki Ishida, Shin’ichiro Matsuo, Wakaha Ogata
      Pages 137-150
    3. Anderson C. A. Nascimento, Joern Mueller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
      Pages 151-164
    4. Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
      Pages 165-179
  6. Invited Talk

  7. Protocol Attacks

    1. Sigrid Gürgens, Carsten Rudolph, Holger Vogt
      Pages 193-207
  8. Attacks on Public Key Algorithms

    1. Toru Akishita, Tsuyoshi Takagi
      Pages 218-233
    2. Peter J. Leadbitter, Nigel P. Smart
      Pages 240-251

About these proceedings

Introduction

The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.

Keywords

PKI infrastructure algorithms authentication data security digital payment systems digital rights management e-commerce information information hiding information security network security privacy security systems security watermarking

Editors and affiliations

  • Colin Boyd
    • 1
  • Wenbo Mao
    • 2
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia
  2. 2.Hewlett-Packard LaboratoriesBristolUK

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20176-2
  • Online ISBN 978-3-540-39981-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349