Advertisement

Information Security

4th International Conference, ISC 2001 Malaga, Spain, October 1–3, 2001 Proceedings

  • George I. Davida
  • Yair Frankel
Conference proceedings ISC 2001

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2200)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Key Distribution

    1. Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky
      Pages 18-26
  3. Protocols

    1. Giovanni Di Crescenzo, Olga Kornievskaia
      Pages 27-45
  4. Enhancing Technologies

    1. Carlo Blundo, Paolo D’Arco, Alfredo De Santis, Clemente Galdi
      Pages 63-80
    2. Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi
      Pages 81-94
  5. Privacy

    1. Dmitri Asonov, Markus Schaal, Johann-Christoph Freytag
      Pages 95-109
    2. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
      Pages 110-124
  6. Software Protection

    1. Enriquillo Valdez, Moti Yung
      Pages 125-143
    2. Stanley Chow, Yuan Gu, Harold Johnson, Vladimir A. Zakharov
      Pages 144-155
  7. Message Hiding I

    1. Mark Chapman, George I. Davida, Marc Rennhard
      Pages 156-165
    2. David Sánchez, Agustín Orfila, Julio César Hernández, José María Sierra
      Pages 166-182
  8. PKI Issues and Protocols

    1. Diana Berbecaru, Antonio Lioy, Marius Marian
      Pages 183-203
    2. Apol⁗ònia Martínez-Nadal, Josep L. Ferrer-Gomila
      Pages 204-219
  9. Hardware Implementations

    1. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro
      Pages 235-247
    2. Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi
      Pages 248-265
  10. Cryptanalysis and Prevention

    1. Rainer Steinwandt, Willi Geiselmann, Thomas Beth
      Pages 280-293
    2. Ismael Jiménez Calvo, German Sáez Moreno
      Pages 310-323
  11. Implementations

    1. Elisa Bertino, Barbara Carminati, Elena Ferrari
      Pages 347-362
  12. Non-repudiation Techniques

    1. Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia
      Pages 379-393
  13. Contracts and Auctions

    1. Josep L. Ferrer-Gomila, Magadalena Payeras-Capellà, Llorenç Huguet-Rotger
      Pages 394-407
    2. Koji Chida, Kunio Kobayashi, Hikaru Morita
      Pages 408-419
  14. Message Hiding II

    1. Francesc Sebé, Josep Domingo-Ferrer
      Pages 420-432
    2. Christian D. Jensen
      Pages 433-445
  15. Payments

    1. Antonio Ruiz, Gregorio Martínez, Oscar Cánovas, Antonio F. Gómez
      Pages 446-461
    2. Ik Rae Jeong, Dong Hoon Lee, Jong In Lim
      Pages 462-474
  16. Security Applications

    1. Jaime Delgado, Isabel Gallego, Xavier Perramon
      Pages 486-496
  17. Network and OS Security

  18. Back Matter
    Pages 553-554

About these proceedings

Introduction

The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Málaga, Spain, on October 1–3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier López and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their contribution to the success of the conference. José M. Troya was the Conference Chair. The General Co chairs were assisted with local arrangements by Antonio Maña, Carlos Maraval, Juan J. Ortega, José M. Sierra, and Miguel Soriano. This was the first year that the conference accepted electronic submissions. Many thanks to Dawn Gibson for assisting in developing and maintaining the electronic submission servers. The conference received 98 submissions of which 37 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the contents of their papers. The Program Committee consisted of Elisa Bertino, Università di Milano; G. R.

Keywords

Authentication Cryptographic Protocols Digital Payment Systems E-Commerce Information Hiding Information Security Network Security PKI Infrastructure Secure Communications Systems Security data security information privacy security

Editors and affiliations

  • George I. Davida
    • 1
  • Yair Frankel
    • 2
  1. 1.Department of EECSUniversity of Wisconsin-MilwaukeeMilwaukeeUSA
  2. 2.Techtegrity, LLCWestfieldUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45439-X
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-42662-2
  • Online ISBN 978-3-540-45439-7
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace