Information and communication security. 2nd international conference, ICICS '99, Sydney, Australia, November 9--11, 1999. Proceedings (Q1965361)

From MaRDI portal
Revision as of 23:26, 19 March 2024 by Openalex240319060354 (talk | contribs) (Set OpenAlex properties.)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
scientific article
Language Label Description Also known as
English
Information and communication security. 2nd international conference, ICICS '99, Sydney, Australia, November 9--11, 1999. Proceedings
scientific article

    Statements

    Information and communication security. 2nd international conference, ICICS '99, Sydney, Australia, November 9--11, 1999. Proceedings (English)
    0 references
    7 February 2000
    0 references
    The articles of mathematical interest will be reviewed individually. The preceding conference (1st, 1997) has been indicated (see Zbl 0877.00018). Indexed articles: \textit{Hall, Chris; Goldberg, Ian; Schneier, Bruce}, Reaction attacks against several public-key cryptosystems, 2-12 [Zbl 0981.94027] \textit{Wu, Wenling; Li, Bao; Feng, Denguo; Qing, Sihan}, Cryptanalysis of some AES candidate algorithms, 13-21 [Zbl 1014.94558] \textit{Pieprzyk, Josef}, Linear secret sharing with divisible shares, 71-86 [Zbl 0981.94046] \textit{Boudot, Fabrice; Traoré, Jacques}, Efficient publicly verifiable secret sharing schemes with fast or delayed recovery, 87-102 [Zbl 0982.94019] \textit{Nguyen, Khanh Quoc; Bao, Feng; Mu, Yi; Varadharajan, Vijay}, Zero-knowledge proofs of possession of digital signatures and its applications, 103-118 [Zbl 0982.94021] \textit{Viswanathan, Kapali; Boyd, Colin; Dawson, Ed}, Signature scheme for controlled environments, 119-134 [Zbl 0982.94023] \textit{Beaver, Cheryl L.; Gemmell, Peter S.; Johnston, Anna M.; Neumann, William}, On the cryptographic value of the \(q^{th}\) root problem, 135-142 [Zbl 1014.94553] \textit{Abe, Masayuki; Okamoto, Tatsuaki}, Delegation chains secure up to constant length, 143-156 [Zbl 0982.94018] \textit{Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki}, Optimal construction of unconditionally secure ID-based key sharing scheme for large-scale networks, 157-168 [Zbl 0982.94014] \textit{Hirose, Shouichi; Matsuura, Kanta}, Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack, 169-182 [Zbl 0982.94015] \textit{Kudo, Michiharu; Mathuria, Anish}, An extended logic for analyzing timed-release public-key protocols, 183-198 [Zbl 0982.94017] \textit{Sander, Tomas}, Efficient accumulators without trapdoor. (Extended abstract), 252-262 [Zbl 0982.94022] \textit{Millan, W.; Burnett, L.; Carter, G.; Clark, A.; Dawson, E.}, Evolutionary heuristics for finding cryptographically strong S-boxes, 263-274 [Zbl 1014.94556] \textit{Ekdahl, Patrik; Smeets, Ben}, Incremental authentication of tree-structured documents, 275-283 [Zbl 0982.94020] \textit{Zheng, Yuliang; Zhang, Xian-Mo}, Plateaued functions, 284-300 [Zbl 0982.94038] \textit{Griffin, Frances; Shparlinski, Igor E.}, On the linear complexity of the Naor-Reingold pseudo-random function, 301-308 [Zbl 0982.94013] \textit{Kobara, Kazukuni; Imai, Hideki}, On the channel capacity of narrow-band subliminal channels, 309-323 [Zbl 0981.94006]
    0 references
    Sydney (Australia)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    ICICS '99
    0 references
    Information security
    0 references
    Communication security
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references