Information Security and Cryptology - Icisc'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings 2000 Edition Contributor(s): Song, Jooseok (Editor) |
|
ISBN: 3540673806 ISBN-13: 9783540673804 Publisher: Springer OUR PRICE: $52.24 Product Type: Paperback Published: April 2000 Annotation: This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information Security and Cryptology, ICISC'99, held in Seoul, Korea, in December 1999. The 20 revised full papers presented together with an invited paper were carefully reviewed and selected from a total of 61 submissions. The book is divided into topical sections on cryptoanalysis and cryptographic design; cryptographic theory and computation complexity; cryptographic protocols and authentication design; digital signatures and secret sharing; and electronic cash, applications, and implementation. |
Additional Information |
BISAC Categories: - Computers | Security - Cryptography - Computers | Computer Science - Mathematics | Discrete Mathematics |
Dewey: 005.8 |
LCCN: 00038822 |
Series: Lecture Notes in Computer Science |
Physical Information: 0.63" H x 6.14" W x 9.21" (0.93 lbs) 284 pages |
Descriptions, Reviews, Etc. |
Publisher Description: The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members ?nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on "Provable Security for Conventional Crypt- raphy". Many people contributed to ICISC'99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC'99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which ?nancially sponsored ICISC'99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung. |