


default search action
2. ICICS 1999: Sydney, Australia
- Vijay Varadharajan, Yi Mu:

Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings. Lecture Notes in Computer Science 1726, Springer 1999, ISBN 3-540-66682-6
Keynote Speech
- Doug McGowan:

International Cryptography (Abstract). 1
Cryptanalysis
- Chris Hall, Ian Goldberg, Bruce Schneier:

Reaction Attacks against several Public-Key Cryptosystems. 2-12 - Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing:

Cryptanalysis of some AES Candidate Algorithms. 13-21
Language Based Approach to Security
- Michael Hitchens

, Vijay Varadharajan:
Issues in the Design of a Language for Role Based Access Control. 22-38 - Lawrie Brown, Dan Sahlin:

Extending ERLANG for Safe Mobile Code Execution. 39-53
Electronic Commerce and Secret Sharing
- Chris Pavlovski

, Colin Boyd, Ernest Foo
:
Detachable Electronic Coins. 54-70 - Josef Pieprzyk

:
Linear Secret Sharing with Divisible Shares. 71-86 - Fabrice Boudot, Jacques Traoré:

Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery. 87-102
Digital Signatures
- Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan:

Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. 103-118 - Kapali Viswanathan, Colin Boyd, Ed Dawson

:
Signature Scheme for Controlled Environments. 119-134 - Cheryl L. Beaver, Peter Gemmell, Anna M. Johnston

, William D. Neumann:
On the Cryptographic Value of The qth Root Problem. 135-142
Keynote Speech
- Sushil Jajodia:

Protecting Critical Information Systems (Abstract). 143
Security Protocols
- Masayuki Abe, Tatsuaki Okamoto:

Delegation Chains Secure up to Constant Length. 144-156 - Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng

, Hideki Imai:
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. 157-168 - Shoichi Hirose, Kanta Matsuura

:
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack. 169-182 - Michiharu Kudo, Anish Mathuria:

An Extended Logic for Analyzing Timed-Release Public-Key Protocols. 183-198
Applications
- Montse Rubia, Juan Carlos Cruellas, Manuel Medina

:
Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. 199-215 - Kazumasa Omote, Eiji Okamoto:

User Identification System Based on Biometrics for Keystroke. 216-229 - Constantinos Markantonakis:

Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards. 230-243 - Wenbo Mao:

Send Message into a Definite Future. 244-251
Cryptography
- Tomas Sander:

Efficient Accumulators without Trapdoor Extended Abstracts. 252-262 - William Millan, L. Burnett, Gary Carter, Andrew J. Clark, Ed Dawson

:
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. 263-274 - Patrik Ekdahl, Ben J. M. Smeets:

Incremental Authentication of Tree-Structured Documents. 275-283
Complexity and Security Functions
- Yuliang Zheng, Xian-Mo Zhang:

Plateaued Functions. 284-300 - Frances Griffin, Igor E. Shparlinski

:
On the Linear Complexity of the Naor-Reingold Pseudo-Random Function. 301-308 - Kazukuni Kobara, Hideki Imai:

On the Channel Capacity of Narrow-Band Subliminal Channels. 309-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














