© 2002

Information and Communications Security

4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings

  • Robert Deng
  • Feng Bao
  • Jianying Zhou
  • Sihan Qing
Conference proceedings ICICS 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2513)

Table of contents

  1. Front Matter
    Pages I-XII
  2. System Security I

  3. Cryptosystem I

    1. Wen-Guey Tzeng, Zhi-Jia Tzeng
      Pages 61-72
    2. Toru Nakanishi, Masayuki Tao, Yuji Sugiyama
      Pages 73-84
    3. Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
      Pages 85-96
    4. Myungsun Kim, Jongseong Kim, Kwangjo Kim
      Pages 97-108
    5. David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina
      Pages 109-121
  4. Security Protocol I

    1. Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park
      Pages 134-146
    2. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
      Pages 147-159
    3. Sami Vaarala, Antti Nuopponen, Teemupekka Virtanen
      Pages 160-172
  5. Fingerprinting & Watermarking

  6. Efficient Implementation of Algorithms

About these proceedings


This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.


Authentication Cryptography Data Security Digital Payment Systems Digital Signatures Information Security Network Security Secure Communications Secure Networking Security Technology Systems Security algorithms communication information security

Editors and affiliations

  • Robert Deng
    • 1
  • Feng Bao
    • 1
  • Jianying Zhou
    • 1
  • Sihan Qing
    • 2
  1. 1.Labs for Information TechnologySingapore
  2. 2.Engineering Research Center for Information Security TechnologyChinese Academy of SciencesBeijingChina

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking