Advertisement

Information and Communications Security

4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings

  • Robert Deng
  • Feng Bao
  • Jianying Zhou
  • Sihan Qing
Conference proceedings ICICS 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2513)

Table of contents

  1. Front Matter
    Pages I-XII
  2. System Security I

  3. Cryptosystem I

    1. Wen-Guey Tzeng, Zhi-Jia Tzeng
      Pages 61-72
    2. Toru Nakanishi, Masayuki Tao, Yuji Sugiyama
      Pages 73-84
    3. Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
      Pages 85-96
    4. Myungsun Kim, Jongseong Kim, Kwangjo Kim
      Pages 97-108
    5. David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina
      Pages 109-121
  4. Security Protocol I

    1. Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park
      Pages 134-146
    2. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
      Pages 147-159
    3. Sami Vaarala, Antti Nuopponen, Teemupekka Virtanen
      Pages 160-172
  5. Fingerprinting & Watermarking

  6. Efficient Implementation of Algorithms

  7. System Security II

    1. Junqi Zhang, Vijay Varadharajan, Yi Mu
      Pages 243-251
    2. Nathan Carey, Andrew Clark, George Mohay
      Pages 252-264
    3. Emilie Lundin, Håkan Kvarnström, Erland Jonsson
      Pages 265-277
    4. Ka-Ping Yee
      Pages 278-290
    5. Jesus Molina, William Arbaugh
      Pages 291-302
  8. Cryptosystem II

    1. Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhuri, Niloy Ganguly, P. Pal Chaudhuri
      Pages 303-314
    2. Alex Biryukov, Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
      Pages 315-326
    3. Soichi Furuya, Kouichi Sakurai
      Pages 327-341
    4. Charles C. Y. Lam, Guang Gong, Scott A. Vanstone
      Pages 354-366
  9. Access Control

    1. Shou-peng Li, Shi-zhong Wu, Tao Guo
      Pages 367-373
    2. Jong-Young Koh, Mi-Ra Yi, Tae-Ho Cho, Hyung-Jong Kim, Hong-Geun Kim
      Pages 374-385
    3. Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki
      Pages 386-398
    4. Javier López, Antonio Maña, Ernesto Pimentel, José M. Troya, Mariemma I. Yagüe
      Pages 399-410
  10. Security Protocol II

    1. Cheng-Kang Chu, Wen-Guey Tzeng
      Pages 411-421
    2. Xiaolin Pang, Kian-Lee Tan, Yan Wang, Jian Ren
      Pages 422-433
  11. Cryptanalysis & Cryptographic Techniques

    1. Alexander Kholosha, Henk C. A. van Tilborg
      Pages 434-446
    2. Hongjun Wu
      Pages 447-455
    3. Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim
      Pages 456-468
    4. Josef Pieprzyk, Xiam-Mo Zhang
      Pages 469-479
    5. Atsuko Miyaji, Masao Nonaka
      Pages 480-494
  12. Back Matter
    Pages 495-496

About these proceedings

Introduction

This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.

Keywords

Authentication Cryptography Data Security Digital Payment Systems Digital Signatures Information Security Network Security Secure Communications Secure Networking Security Technology Systems Security algorithms communication information security

Editors and affiliations

  • Robert Deng
    • 1
  • Feng Bao
    • 1
  • Jianying Zhou
    • 1
  • Sihan Qing
    • 2
  1. 1.Labs for Information TechnologySingapore
  2. 2.Engineering Research Center for Information Security TechnologyChinese Academy of SciencesBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-36159-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-00164-5
  • Online ISBN 978-3-540-36159-6
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site