Skip to main content
  • Conference proceedings
  • © 2003

Information Security

6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2851)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2003.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Invited Talk

    1. Revisiting Software Protection

      • Paul C. van Oorschot
      Pages 1-13
  3. Network Security

    1. Enabling Shared Audit Data

      • Adrian Baldwin, Simon Shiu
      Pages 14-28
    2. Single Sign-On Using Trusted Platforms

      • Andreas Pashalidis, Chris J. Mitchell
      Pages 54-68
  4. Public-Key Algorithms

    1. Easy Verifiable Primitives and Practical Public Key Cryptosystems

      • David Galindo, Sebastià Martín, Paz Morillo, Jorge L. Villar
      Pages 69-83
    2. Reactively Secure Signature Schemes

      • Michael Backes, Birgit Pfitzmann, Michael Waidner
      Pages 84-95
    3. A Fast Signature Scheme Based on New On-line Computation

      • Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto
      Pages 111-121
  5. Cryptographic Protocols

    1. Distributed RSA Signature Schemes for General Access Structures

      • Javier Herranz, Carles Padró, Germán Sáez
      Pages 122-136
    2. Divisible Voting Scheme

      • Natsuki Ishida, Shin’ichiro Matsuo, Wakaha Ogata
      Pages 137-150
    3. Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations

      • Anderson C. A. Nascimento, Joern Mueller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
      Pages 151-164
    4. The Design and Implementation of Protocol-Based Hidden Key Recovery

      • Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
      Pages 165-179
  6. Protocol Attacks

    1. On the Security of Fair Non-repudiation Protocols

      • Sigrid Gürgens, Carsten Rudolph, Holger Vogt
      Pages 193-207
  7. Attacks on Public Key Algorithms

    1. Zero-Value Point Attacks on Elliptic Curve Cryptosystem

      • Toru Akishita, Tsuyoshi Takagi
      Pages 218-233
    2. Analysis of the Insecurity of ECMQV with Partially Known Nonces

      • Peter J. Leadbitter, Nigel P. Smart
      Pages 240-251

Other Volumes

  1. Information Security

About this book

The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.

Editors and Affiliations

  • Information Security Institute, Queensland University of Technology, Brisbane, Australia

    Colin Boyd

  • Hewlett-Packard Laboratories, Bristol, UK

    Wenbo Mao

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access