Limit search to available items
Book Cover
Book
Author ACISP '98 (1998 : Brisbane, Qld.)

Title Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings / Colin Boyd, Ed Dawson, (eds.)
Published Berlin ; New York : Springer, [1998]
©1998

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Aci/Isa 1998  AVAILABLE
Description xi, 422 pages : illustrations ; 24 cm
Series Lecture notes in computer science, 0302-9743 ; 1438
Lecture notes in computer science ; 1438
Contents A Review of the SESAME Development / Per Kaijser -- The Security of Public Key Cryptosystems Based on Integer Factorization / Siguna Muller and Winfried B. Muller -- A Uniform Approach to Securing Unix Applications Using SESAME / Paul Ashley, Mark Vandenwauver and Bradley Broom -- Integrated Management of Network and Host Based Security Mechanisms / Rainer Falk and Markus Trommer -- Covert Distributed Computing Using Java Through Web Spoofing / Jeffrey Horton and Jennifer Seberry -- Differential Cryptanalysis of a Block Cipher / Xun Yi, Kwok Yan Lam and Yongfei Han -- On Private-Key Cryptosystems Based on Product Codes / Hung-Min Sun and Shiuh-Pyng Shieh -- Key Schedules of Iterative Block Ciphers / Gary Carter, Ed Dawson and Lauren Nielsen -- Low-Cost Secure Server Connection with Limited-Privilege Clients / Uri Blumenthal, N. C. Hien and J. H. Rooney -- A Solution to Open Standard of PKI / Qi He, Katia Sycara and Zhongmin Su -- Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks / E. Franz, A. Graubner and A. Jerichow [et al.] -- Correlation Attacks on Up/Down Cascades / Jovan Dj. Golic and Renato Menicocci -- A Stream Cipher Based on Linear Feedback over GF(2[superscript 8]) / Greg Rose -- A Probabilistic Correlation Attack on the Shrinking Generator / L. Simpson, J. Dj. Golic and E. Dawson -- Bounds and Constructions for A[superscript 3]-code with Multi-senders / Rei Safavi-Naini and Yejing Wang -- Rotation-Symmetric Functions and Fast Hashing / Josef Pieprzyk and Cheng Xin Qu -- How to Improve the Nonlinearity of Bijective S-Boxes / William Millan -- Object Modeling of Cryptographic Algorithms with UML / Rauli Kaksonen and Petri Mahonen -- Adapting an Electronic Purse for Internet Payments / Martin Manninger and Robert Schischka -- LITESET: A Light-Weight Secure Electronic Transaction Protocol / Goichiro Hanaoka, Yuliang Zheng and Hideki Imai -- Applications of Linearised and Sub-linearised Polynomials to Information Security / Marie Henderson -- Protocol Failures Related to Order of Encryption and Signature: Computation of Discrete Logarithms in RSA Groups / Mark Chen and Eric Hughes -- Protection Against EEPROM Modification Attacks / W. W. Fung and J. W. Gray III -- Trends in Quantum Cryptography in Czech Republic / Jaroslav Hruby -- A High Level Language for Conventional Access Control Models / Yun Bai and Vijay Varadharajan -- Fast Access Control Decisions from Delegation Certificate Databases / Tuomas Aura -- Meta Objects for Access Control: Role-Based Principals / Thomas Riechmann and Jurgen Kleinoder -- A Dynamically Typed Access Control Model / Jonathon E. Tidswell and John M. Potter -- Efficient Identity-Based Conference Key Distribution Protocols / Shahrokh Saeednia and Rei Safavi-Naini -- A Formal Model for Systematic Design of Key Establishment Protocols / Carsten Rudolph -- Key Establishment Protocols for Secure Mobile Communications: A Selective Survey / Colin Boyd and Anish Mathuria -- Detecting Key-Dependencies / Tage Stabell-Kulo, Arne Helme and Gianluca Dini -- Secret Sharing in Multilevel and Compartmented Groups / Hossein Ghodosi, Josef Pieprzyk and Rei Safavi-Naini -- On Construction of Cumulative Secret Sharing Schemes / Hossein Ghodosi, Josef Pieprzyk and Rei Safavi-Naini [et al.] -- A Comment on the Efficiency of Secret Sharing Scheme over any Finite Abelian Group / Yvo Desmedt, Brian King and Wataru Kishimoto [et al.] -- A User Identification System Using Signature Written with Mouse / Agus Fanar Syukri, Eiji Okamoto and Masahiro Mambo -- On Zhang's Nonrepudiable Proxy Signature Schemes / Narn-Yih Lee, Tzonelih Hwang and Chih-Hung Wang
Summary This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998. The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures
Notes ANALYTIC
Bibliography Includes bibliographical references and index
Notes Also available in print
Mode of access: World Wide Web
Subject Computer security -- Congresses.
Data protection -- Congresses.
Privacy, Right of -- Congresses.
Genre/Form Conference papers and proceedings.
Author Boyd, Colin.
Dawson, Ed (Edward)
Australasian Conference on Information Security and Privacy, ACISP (3 : 13-07-1998 - 15-07-1998 : Brisbane, Australia)
LC no. 98035424
ISBN 3540647325 (softcover : alk. paper)
Other Titles ACISP '98
ACISP'98