2. ICISC 1999:
Seoul,
Korea
JooSeok Song (Ed.):
Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings.
Lecture Notes in Computer Science 1787 Springer 2000, ISBN 3-540-67380-6 BibTeX
@proceedings{DBLP:conf/icisc/1999,
editor = {JooSeok Song},
title = {Information Security and Cryptology - ICISC'99, Second International
Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
booktitle = {ICISC},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {1787},
year = {2000},
isbn = {3-540-67380-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Invited Talk
Cryptanalysis and Cryptographic Design
Cryptographic Theory and Computation Complexity
Cryptographic Protocol and Authentication Design
- Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.
120-131 BibTeX
- Kapali Viswanathan, Colin Boyd, Ed Dawson:
Secure Selection Protocols.
132-146 BibTeX
- Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang:
Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client.
147-155 BibTeX
- Kook-Heui Lee, Sang-Jae Moon, Won-Young Jeong, Tae-Geun Kim:
A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications.
156-168 BibTeX
Digital Signature and Secret Sharing Scheme
Electronic Cash,
Application,
Implementation
Copyright © Sat May 16 23:20:17 2009
by Michael Ley (ley@uni-trier.de)