Skip to main content
  • Conference proceedings
  • © 2001

Information and Communications Security

Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2229)

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-45600-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 129.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (56 papers)

  1. Front Matter

    Pages I-XIV
  2. An Intelligent Intruder Model for Security Protocol Analysis

    • Dongxi Liu, Xiaoyong Li, Yingcai Bai
    Pages 13-22
  3. Primitive Polynomials over GF(2) — A Cryptologic Approach

    • Kishan Chand Gupta, Subhamoy Maitra
    Pages 23-34
  4. Unconditionally-Secure Oblivious Transfer

    • Bo Yang, Shixiong Zhu, Yumin Wang
    Pages 35-41
  5. Cryptanalysis of the Improved User Efficient Blind Signatures

    • Chin-Chen Chang, Iuon-Chang Lin
    Pages 42-46
  6. A Cyclic Window Algorithm for ECC Defined over Extension Fields

    • Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi
    Pages 62-73
  7. Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves

    • Fangguo Zhang, Futai Zhang, Yumin Wang
    Pages 74-83
  8. Attacks on Two Digital Signature Schemes Based on Error Correcting Codes

    • Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou
    Pages 84-89
  9. A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems

    • Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim
    Pages 107-118
  10. Dealing with Uncertainties in Risk Analysis Using Belief Functions

    • Sungbaek Cho, Zbigniew Ciechanowicz
    Pages 119-130
  11. RBAC for XML Document Stores

    • Michael Hitchens, Vijay Varadharajan
    Pages 131-143
  12. Cheating Immune Secret Sharing

    • Xian-Mo Zhang, Josef Pieprzyk
    Pages 144-149
  13. Encryption Sticks (Randomats)

    • Gideon Samid
    Pages 150-154
  14. Applying NCP Logic to the Analysis of SSL 3.0

    • Zhimin Song, Sihan Qing
    Pages 155-166
  15. Performance of WTLS and Its Impact on an M-commerce Transaction

    • Ian Herwono, Ingo Liebhardt
    Pages 167-171

About this book

ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China, 13-16 November 2001. Among the preceding conferences, ICICS’97 was held in Beijing, China, 11-14 November 1997 and ICICS’99 in Sydney, Australia, 9-11 November 1999. The ICICS’97 and ICICS’99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag’s Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Association for Cryptologic Re- arch (IACR), the International Communications and Information Security - sociation (ICISA), and the Asiacrypt Steering Committee. The format of ICICS 2001 was selected to cover the complete spectrum of - formation and communications security, and to promote participant interaction. The sessions were designed to promote interaction between the major topics of the conference: theoretical foundations of security, secret sharing, network - curity, authentication and identi?cation, boolean functions and stream ciphers, security evaluation, signatures, block ciphers and public-key systems, infor- tion hiding, protocols and their analysis, and cryptanalysis. The 29-member Program Committee considered 134 submissions from 23 di- rent countries and regions, among them 56 papers were accepted for presentation.

Keywords

  • Authentication
  • Boolean function
  • Code
  • Computational Algebra
  • Cryptographic Algorithms
  • Data Security
  • Digital Communication
  • Digital Signature Schemes
  • Error-correcting Code
  • Information
  • Information Security
  • Internet Security
  • Routing
  • communication
  • finite field
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Engineering Research Center for Information Security Technology (ERCIST), Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • NTT Labs, Yokosuka-shi, Japan

    Tatsuaki Okamoto

  • Oracle Corporation, Redwood Shores, USA

    Jianying Zhou

Bibliographic Information

  • Book Title: Information and Communications Security

  • Book Subtitle: Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings

  • Editors: Sihan Qing, Tatsuaki Okamoto, Jianying Zhou

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/3-540-45600-7

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2001

  • Softcover ISBN: 978-3-540-42880-0Published: 24 October 2001

  • eBook ISBN: 978-3-540-45600-1Published: 30 June 2003

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 510

  • Topics: Cryptology, Computer Communication Networks, Operating Systems, Algorithms, IT Operations, IT in Business

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-45600-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 129.00
Price excludes VAT (USA)