Information Security

5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 – October 2, 2002 Proceedings

  • Agnes Hui Chan
  • Virgil Gligor

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2433)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Intrusion Detection and Tamper Resistance

  3. Cryptographic Algorithm and Attack Implementation

    1. Helger Lipmaa
      Pages 63-74
    2. Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr et al.
      Pages 75-89
    3. Kahil Jallad, Jonathan Katz, Bruce Schneier
      Pages 90-101
  4. Access Control and Trust Management (I)

    1. G. Navarro, S. Robles, J. Borrell
      Pages 102-116
    2. Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno
      Pages 117-135
    3. Ed Dawson, Javier Lopez, Jose A. Montenegro, Eiji Okamoto
      Pages 136-149
  5. Authentication and Privacy

    1. Feng Zhu, Duncan S. Wong, Agnes H. Chan, Robbie Ye
      Pages 150-161
    2. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen
      Pages 162-176
    3. Weidong Qiu, Kefei Chen, Dawu Gu
      Pages 177-190
  6. E-commerce Protocols (I)

    1. Masayuki Abe, Koutarou Suzuki
      Pages 191-199
    2. Nicolás González-Deleito, Olivier Markowitch
      Pages 200-209
    3. Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellá, Llorenç Huguet-Rotger
      Pages 210-219
  7. Signature Schemes

    1. Apol·lònia Martínez-Nadal, Josep Lluís Ferrer-Gomila
      Pages 229-243
    2. Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai
      Pages 244-256

About these proceedings

Introduction

As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security Workshop, first held in Ishikawa, Japan 1997. ISC 2002 was held in Sao Paulo, Brazil, on September 30– October 2, 2002. The Program Committee considered 81 submissions of which 38 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. The papers provide a representative sample of both the variety and the truly international scope of information security research conducted currently. The topics addressed range from e-commerce protocols to access control and trust management, and to cryptography and cryptographic algorithms. Many people deserve our gratitude for their contribution to the success of the conference. We would like to thank the General Chair, Routo Terada, for overseeing the local arrangements, including registration and maintaining the conference website, and for the smooth running of the conference. We are grateful to Robbie Ye for his expert help in processing the electronic submissions, reviews and acceptance notifications. Robbie’s enthusiasm and energy greatly simplified the Program Committee’s task of conducting the on-line evaluation of the submitted papers under tight time constraints.

Keywords

algorithms cryptography data security information privacy security

Editors and affiliations

  • Agnes Hui Chan
    • 1
  • Virgil Gligor
    • 2
  1. 1.College of Computer ScienceNortheastern UniversityBostonUSA
  2. 2.Department of Electrical and Computer EngineeringUniversity of MarylandCollege ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45811-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-44270-7
  • Online ISBN 978-3-540-45811-1
  • Series Print ISSN 0302-9743
  • About this book