© 1999

Information and Communication Security

Second International Conference, ICICS’99, Sydney, Australia, November 9-11, 1999. Proceedings

  • Vijay Varadharajan
  • Yi Mu
Conference proceedings ICICS 1999

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1726)

Table of contents

  1. Front Matter
  2. Keynote Speech

    1. Doug McGowan
      Pages 1-1
  3. Cryptanalysis

    1. Chris Hall, Ian Goldberg, Bruce Schneier
      Pages 2-12
    2. Wenling Wu, Bao Li, Denguo Feng, Sihan Qing
      Pages 13-21
  4. Language Based Approach to Security

    1. Michael Hitchens, Vijay Varadharajan
      Pages 22-38
    2. Lawrie Brown, Dan Sahlin
      Pages 39-53
  5. Electronic Commerce and Secret Sharing

    1. Chris Pavlovski, Colin Boyd, Ernest Foo
      Pages 54-70
    2. Josef Pieprzyk
      Pages 71-86
  6. Digital Signatures

    1. Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan
      Pages 103-118
    2. Kapali Viswanathan, Colin Boyd, Ed Dawson
      Pages 119-134
    3. Cheryl L. Beaver, Peter S. Gemmell, Anna M. Johnston, William Neumann
      Pages 135-142
  7. Keynote Speech

    1. Sushil Jajodia
      Pages 143-143
  8. Security Protocols

    1. Masayuki Abe, Tatsuaki Okamoto
      Pages 144-156
    2. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
      Pages 157-168
    3. Michiharu Kudo, Anish Mathuria
      Pages 183-198
  9. Applications

About these proceedings


ICICS’99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer Society, IEEE Computer Chapter (NSW), and Harvey World Travel. I am g- teful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors and users of information security systems and technologies. A range of aspects was addressed from security theory and modeling to system and protocol designs and implementations to applications and management. The conference con- sted of a series of refereed technical papers and invited technical presentations. The program committee invited two distinguished key note speakers. The ?rst keynote speech by Doug McGowan, a Senior Manager from Hewlett-Packard, USA, discussed cryptography in an international setting. Doug described the current status of international cryptography and explored possible future trends and new technologies. The second keynote speech was delivered by Sushil Ja- dia of George Mason University, USA. Sushil’s talk addressed the protection of critical information systems. He discussed issues and methods for survivability of systems under malicious attacks and proposed a fault-tolerance based - proach. The conference also hosted a panel on the currently much debated topic of Internet censorship. The panel addressed the issue of censorship from various viewpoints namely legal, industrial, governmental and technical.


Cryptology Data Security Electronic Commerce Information Security Network Security Privacy Secure Communications communication complexity cryptography information

Editors and affiliations

  • Vijay Varadharajan
    • 1
  • Yi Mu
    • 2
  1. 1.Macquarie UniversitySydneyAustralia
  2. 2.Centre for Computer and Information Security Research School of Computer Science and Software EngineeringUniversity of WollongongAustralia

Bibliographic information