Skip to main content
  • Conference proceedings
  • © 2002

Information and Communications Security

4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2513)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2002.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (41 papers)

  1. Front Matter

    Pages I-XII
  2. System Security I

    1. An Evaluation of Different IP Traceback Approaches

      • Vadim Kuznetsov, Helena Sandström, Andrei Simkin
      Pages 37-48
    2. Security against Inference Attacks on Negative Information in Object-Oriented Databases

      • Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara
      Pages 49-60
  3. Cryptosystem I

    1. Robust Key-Evolving Public Key Encryption Schemes

      • Wen-Guey Tzeng, Zhi-Jia Tzeng
      Pages 61-72
    2. A Group Signature Scheme Committing the Group

      • Toru Nakanishi, Masayuki Tao, Yuji Sugiyama
      Pages 73-84
    3. Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions

      • Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
      Pages 85-96
    4. Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption

      • Myungsun Kim, Jongseong Kim, Kwangjo Kim
      Pages 97-108
    5. Reducing the Memory Complexity of Type-Inference Algorithms

      • David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina
      Pages 109-121
  4. Security Protocol I

    1. Password-Authenticated Key Exchange between Clients with Different Passwords

      • Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park
      Pages 134-146
    2. Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction

      • Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
      Pages 147-159
    3. Attacking Predictable IPsec ESP Initialization Vectors

      • Sami Vaarala, Antti Nuopponen, Teemupekka Virtanen
      Pages 160-172
  5. Fingerprinting & Watermarking

    1. An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code

      • Hajime Watanabe, Takashi Kitagawa
      Pages 173-183
    2. A Robust Block Oriented Watermarking Scheme in Spatial Domain

      • Tanmoy Kanti Das, Subhamoy Maitra
      Pages 184-196
  6. Efficient Implementation of Algorithms

    1. Fast Elliptic Curve Multiplications with SIMD Operations

      • Tetsuya Izu, Tsuyoshi Takagi
      Pages 217-230

Other Volumes

  1. Information and Communications Security

About this book

This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.

Editors and Affiliations

  • Labs for Information Technology, Singapore

    Robert Deng, Feng Bao, Jianying Zhou

  • Engineering Research Center for Information Security Technology, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access