Overview
- Editors:
-
-
George I. Davida
-
Department of EECS, University of Wisconsin-Milwaukee, Milwaukee, USA
-
Yair Frankel
-
Techtegrity, LLC, Westfield, USA
Access this book
Other ways to access
About this book
The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Málaga, Spain, on October 1–3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier López and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their contribution to the success of the conference. José M. Troya was the Conference Chair. The General Co chairs were assisted with local arrangements by Antonio Maña, Carlos Maraval, Juan J. Ortega, José M. Sierra, and Miguel Soriano. This was the first year that the conference accepted electronic submissions. Many thanks to Dawn Gibson for assisting in developing and maintaining the electronic submission servers. The conference received 98 submissions of which 37 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the contents of their papers. The Program Committee consisted of Elisa Bertino, Università di Milano; G. R.
Table of contents (37 papers)
-
Front Matter
Pages I-XIII
-
Key Distribution
-
- Carlo Blundo, Paolo D’Arco, Vanesa Daza, Carles Padró
Pages 1-17
-
- Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky
Pages 18-26
-
Protocols
-
- Giovanni Di Crescenzo, Olga Kornievskaia
Pages 27-45
-
- Sigrid Gürgens, Javier Lopez
Pages 46-62
-
Enhancing Technologies
-
- Carlo Blundo, Paolo D’Arco, Alfredo De Santis, Clemente Galdi
Pages 63-80
-
- Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi
Pages 81-94
-
Privacy
-
- Dmitri Asonov, Markus Schaal, Johann-Christoph Freytag
Pages 95-109
-
- Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
Pages 110-124
-
Software Protection
-
- Enriquillo Valdez, Moti Yung
Pages 125-143
-
- Stanley Chow, Yuan Gu, Harold Johnson, Vladimir A. Zakharov
Pages 144-155
-
Message Hiding I
-
- Mark Chapman, George I. Davida, Marc Rennhard
Pages 156-165
-
- David Sánchez, Agustín Orfila, Julio César Hernández, José María Sierra
Pages 166-182
-
PKI Issues and Protocols
-
- Diana Berbecaru, Antonio Lioy, Marius Marian
Pages 183-203
-
- Apol⁗ònia Martínez-Nadal, Josep L. Ferrer-Gomila
Pages 204-219
-
Hardware Implementations
-
- Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott
Pages 220-234
-
- Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro
Pages 235-247
-
- Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi
Pages 248-265
-
- Sheng-Bo Xu, Lejla Batina
Pages 266-279
-
Cryptanalysis and Prevention
-
- Rainer Steinwandt, Willi Geiselmann, Thomas Beth
Pages 280-293
Editors and Affiliations
-
Department of EECS, University of Wisconsin-Milwaukee, Milwaukee, USA
George I. Davida
-
Techtegrity, LLC, Westfield, USA
Yair Frankel