Table of contents

  1. Front Matter
  2. Giovanni di Crescenzo, Kouichi Sakurai, Moti Yung
    Pages 17-27
  3. Ingrid Biehl, Susanne Wetzel
    Pages 61-71
  4. Hossein Ghodosi, Josef Pieprzyk, Rei Safavi-Naini
    Pages 72-80
  5. Chris Charnes, Keith Martin, Josef Pieprzyk, Rei Safavi-Nainil
    Pages 81-86
  6. Tuomas Aura, Pekka Nikander
    Pages 87-97
  7. Rakman Choi, Jungchan Na, Kwonil Lee, Eunmi Kim, Wooyong Han
    Pages 98-108
  8. Antonio Lioy, Fabio Maino, Marco Mezzalama
    Pages 109-117
  9. Satoshi Obana, Kaoru Kurosawa
    Pages 118-129
  10. K. M. Martin, R. Safavi-Naini
    Pages 130-143
  11. Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo
    Pages 144-148
  12. William Millan, Andrew Clark, Ed Dawson
    Pages 149-158
  13. Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
    Pages 159-169
  14. Ed Dawson, Chuan-Kun Wu
    Pages 170-180
  15. Audun Jøsang
    Pages 192-202

About these proceedings

Introduction

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.

Keywords

cryptology information security network security privacy telecommunications

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0028456
  • Copyright Information Springer-Verlag 1997
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-63696-0
  • Online ISBN 978-3-540-69628-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book