Skip to main content
  • Conference proceedings
  • © 2002

Information Security

5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 – October 2, 2002, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2433)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2002.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

    Pages I-XII
  2. Intrusion Detection and Tamper Resistance

    1. Real-Time Intruder Tracing through Self-Replication

      • Heejin Jang, Sangwook Kim
      Pages 1-16
  3. Cryptographic Algorithm and Attack Implementation

    1. Fast Software Implementations of SC2000

      • Helger Lipmaa
      Pages 63-74
    2. Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512

      • Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr et al.
      Pages 75-89
    3. Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG

      • Kahil Jallad, Jonathan Katz, Bruce Schneier
      Pages 90-101
  4. Access Control and Trust Management (I)

    1. Role-Based Access Control for E-commerce Sea-of-Data Applications

      • G. Navarro, S. Robles, J. Borrell
      Pages 102-116
    2. An Access Control Model for Tree Data Structures

      • Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno
      Pages 117-135
    3. A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI

      • Ed Dawson, Javier Lopez, Jose A. Montenegro, Eiji Okamoto
      Pages 136-149
  5. Authentication and Privacy

    1. Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks

      • Feng Zhu, Duncan S. Wong, Agnes H. Chan, Robbie Ye
      Pages 150-161
    2. Quantifying Privacy Leakage through Answering Database Queries

      • Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen
      Pages 162-176
    3. A New Offiine Privacy Protecting E-cash System with Revokable Anonymity

      • Weidong Qiu, Kefei Chen, Dawu Gu
      Pages 177-190
  6. E-commerce Protocols (I)

    1. Receipt-Free Sealed-Bid Auction

      • Masayuki Abe, Koutarou Suzuki
      Pages 191-199
    2. Exclusion-Freeness in Multi-party Exchange Protocols

      • Nicolás González-Deleito, Olivier Markowitch
      Pages 200-209
    3. A Realistic Protocol for Multi-party Certified Electronic Mail

      • Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellá, Llorenç Huguet-Rotger
      Pages 210-219
  7. Signature Schemes

    1. Comments to the UNCITRAL Model Law on Electronic Signatures

      • Apol·lònia Martínez-Nadal, Josep Lluís Ferrer-Gomila
      Pages 229-243
    2. An Anonymous Loan System Based on Group Signature Scheme

      • Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai
      Pages 244-256

Other Volumes

  1. Information Security

About this book

As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security Workshop, first held in Ishikawa, Japan 1997. ISC 2002 was held in Sao Paulo, Brazil, on September 30– October 2, 2002. The Program Committee considered 81 submissions of which 38 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. The papers provide a representative sample of both the variety and the truly international scope of information security research conducted currently. The topics addressed range from e-commerce protocols to access control and trust management, and to cryptography and cryptographic algorithms. Many people deserve our gratitude for their contribution to the success of the conference. We would like to thank the General Chair, Routo Terada, for overseeing the local arrangements, including registration and maintaining the conference website, and for the smooth running of the conference. We are grateful to Robbie Ye for his expert help in processing the electronic submissions, reviews and acceptance notifications. Robbie’s enthusiasm and energy greatly simplified the Program Committee’s task of conducting the on-line evaluation of the submitted papers under tight time constraints.

Editors and Affiliations

  • College of Computer Science, Northeastern University, Boston, USA

    Agnes Hui Chan

  • Department of Electrical and Computer Engineering, University of Maryland, College Park, USA

    Virgil Gligor

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access