Information Security

6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003. Proceedings

  • Colin Boyd
  • Wenbo Mao
Conference proceedings ISC 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2851)

Table of contents

  1. Front Matter
  2. Invited Talk

    1. Paul C. van Oorschot
      Pages 1-13
  3. Network Security

    1. Adrian Baldwin, Simon Shiu
      Pages 14-28
    2. Andreas Pashalidis, Chris J. Mitchell
      Pages 54-68
  4. Public-Key Algorithms

    1. David Galindo, Sebastià Martín, Paz Morillo, Jorge L. Villar
      Pages 69-83
    2. Michael Backes, Birgit Pfitzmann, Michael Waidner
      Pages 84-95
    3. Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto
      Pages 111-121
  5. Cryptographic Protocols

    1. Javier Herranz, Carles Padró, Germán Sáez
      Pages 122-136
    2. Natsuki Ishida, Shin’ichiro Matsuo, Wakaha Ogata
      Pages 137-150
    3. Anderson C. A. Nascimento, Joern Mueller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
      Pages 151-164
    4. Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
      Pages 165-179
  6. Invited Talk

  7. Protocol Attacks

    1. Sigrid Gürgens, Carsten Rudolph, Holger Vogt
      Pages 193-207
  8. Attacks on Public Key Algorithms

    1. Toru Akishita, Tsuyoshi Takagi
      Pages 218-233
    2. Peter J. Leadbitter, Nigel P. Smart
      Pages 240-251
  9. Block Ciphers

  10. Authorization

    1. Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta
      Pages 295-309
    2. Chun Ruan, Vijay Varadharajan, Yan Zhang
      Pages 310-324
  11. Watermarking

    1. Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim
      Pages 338-351
  12. Software Security

    1. Hongxia Jin, Jeffery Lotspiech
      Pages 352-365
    2. José L. Vivas, José A. Montenegro, Javier López
      Pages 381-395
  13. Codes and Related Issues

    1. Yvo Desmedt, Kaoru Kurosawa, Tri Van Le
      Pages 396-407
    2. Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
      Pages 408-421
    3. Tri Van Le, Mike Burmester, Jiangyi Hu
      Pages 422-427
    4. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
      Pages 428-441
  14. Back Matter

About these proceedings


The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.


PKI infrastructure algorithms authentication data security digital payment systems digital rights management e-commerce information information hiding information security network security privacy security systems security watermarking

Editors and affiliations

  • Colin Boyd
    • 1
  • Wenbo Mao
    • 2
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia
  2. 2.Hewlett-Packard LaboratoriesBristolUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20176-2
  • Online ISBN 978-3-540-39981-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software