1. ICICS 1997: Beijing, China

Session 1: Theoretical Foundations of Security

Session 2: Secret Sharing

Session 3: Network Security

Session 4: Authentication and Identification

Session 5: Boolean Functions and Stream Ciphers

Session 6: Security Evaluation

Session 7: Signatures

Session 8: Block Ciphers

Session 9: Public Key Systems 1

Session 10: Cryptanalysis of Public Key Systems

Session 11: Subliminal Channels

Session 12: Public Key Systems 2

Session 13: Key Recovery/Fair Cryptosystem

Session 14: Intellectual Property Protection

Session 15: Protocols

Session 16: Electronic Commerce