Advertisement

Table of contents

  1. Front Matter
  2. Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko
    Pages 32-42
  3. Hidema Tanaka, Toinoya Ohishi, Toshinobu Kaneko
    Pages 43-54
  4. R. Balasubramanian, S. V. Nagaraj
    Pages 66-74
  5. Hidenori Kuwakado, Hatsukazu Tanaka
    Pages 75-81
  6. Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi
    Pages 82-95
  7. Daisuke Nakamura, Kunikatsu Kobayashi
    Pages 96-108
  8. Kazuo Ohta
    Pages 109-115
  9. George Davida, René Peralta
    Pages 116-120
  10. John Kelsey, Bruce Schneier, Chris Hall, David Wagner
    Pages 121-134
  11. Yoshiki Sameshima
    Pages 135-146
  12. Kouichi Sakuraii, Yoshinori Yamane, Shingo Miyazaki, Tohru Inoue
    Pages 147-157
  13. A. Satoh, Y. Kobayashi, H. Niijima, N. Ooba, S. Munetoh, S. Sone
    Pages 174-187
  14. Kenji Koyama, Routo Terada
    Pages 198-208
  15. X. Yi, K. Y. Lam, S. X. Cheng, X. H. You
    Pages 209-220
  16. Mihir Bellare
    Pages 221-231
  17. Jussipekka Leiwo, Yuliang Zheng
    Pages 232-245
  18. J. -M. Kabasele-Tenday
    Pages 246-255
  19. Kan Zhang
    Pages 256-265
  20. Seungjoo Kim, Sangjoon Park, Dongho Won
    Pages 273-281
  21. Kan Zhang
    Pages 282-290
  22. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Pages 313-320
  23. Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo
    Pages 335-344
  24. Kouichi Yamazaki, Masao Osaki, Osamu Hirota
    Pages 345-356
  25. Back Matter

About these proceedings

Introduction

This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in September 1997. The volume presents six invited surveys together with 25 thoroughly revised full papers selected from 39 submissions. Among the topics covered are public-key cryptosystems, cryptoanalysis, digital signatures, hardware/software implementation, key management, key sharing, security management, electronic commerce, and quantum cryptology.

Keywords

Algorithms Automat Hardware Public Key Smart Card automata communication cryptography data security information operating system privacy real-time security

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0030404
  • Copyright Information Springer-Verlag Berlin Heidelberg 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-64382-1
  • Online ISBN 978-3-540-69767-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site