Lecture Notes in Computer Science

Information and Communications Security

4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings

Editors: Deng, Robert H., Bao, Feng, Zhou, Jianying (Eds.)

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-540-36159-6
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $139.00
price for USA
  • ISBN 978-3-540-00164-5
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.

Table of contents (11 chapters)

  • An Evaluation of Different IP Traceback Approaches

    Vadim Kuznetsov, Helena Sandström, Andrei Simkin

    Pages 37-48

  • Security against Inference Attacks on Negative Information in Object-Oriented Databases

    Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara

    Pages 49-60

  • Password-Authenticated Key Exchange between Clients with Different Passwords

    Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, et al.

    Pages 134-146

  • A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing

    Tatsuyuki Matsushita

    Pages 197-208

  • Fast Elliptic Curve Multiplications with SIMD Operations

    Tetsuya Izu, Tsuyoshi Takagi

    Pages 217-230

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-540-36159-6
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $139.00
price for USA
  • ISBN 978-3-540-00164-5
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information and Communications Security
Book Subtitle
4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings
Editors
  • Robert H. Deng
  • Feng Bao
  • Jianying Zhou
Series Title
Lecture Notes in Computer Science
Series Volume
2513
Copyright
2002
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-36159-6
DOI
10.1007/3-540-36159-6
Softcover ISBN
978-3-540-00164-5
Series ISSN
0302-9743
Edition Number
1
Number of Pages
XII, 500
Topics