Limit search to available items
Record 8 of 11
Previous Record Next Record
Book Cover
Book
Author ACISP '99 (1999 : Wollongong, N.S.W.)

Title Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings / Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry (eds.)
Published Berlin ; New York : Springer, [1999]
Berlin, Heidelberg : Springer Berlin Heidelberg, 1999
©1999

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Aci/Isa 1999  AVAILABLE
Description 327 unnumbered pages : illustrations
Series Lecture notes in computer science ; 1587
Lecture notes in computer science ; 1587
Contents Boolean Function Design Using Hill Climbing Methods / William Millan, Andrew Clark and Ed Dawson -- Enumeration of Correlation Immune Boolean Functions / Subhamoy Maitra and Palash Sarkar -- On the Symmetric Property of Homogeneous Boolean Functions / Chengxin Qu, Jennifer Seberry and Josef Pieprzyk -- Publicly Verifiable Key Escrow with Limited Time Span / Kapali Viswanathan, Colin Boyd and Ed Dawson -- Accelerating Key Establishment Protocols for Mobile Communication / Seungwon Lee, Seong-Min Hong and Hyunsoo Yoon -- Conference Key Agreement from Secret Sharing / Chih-Hung Li and Josef Pieprzyk -- On m-Permutation Protection Scheme Against Modification Attack / W. W. Fung and J. W. Gray III -- Inversion Attack and Branching / Jovan Dj. Golic, Andrew Clark and Ed Dawson -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves / Willy Susilo, Rei Safavi-Naini and Josef Pieprzyk -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature / Khanh Quoc Nguyen, Yi Mu and Vijay Varadharajan -- Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes / Hossein Ghodosi and Josef Pieprzyk -- On the Security of an RSA Based Encryption Scheme / Siguna Muller -- Generalised Cycling Attacks on RSA and Strong RSA Primes / Marc Gysin and Jennifer Seberry -- RSA Acceleration with Field Programmable Gate Arrays / Alexander Tiountchik and Elena Trichina -- Changing Thresholds in the Absence of Secure Channels / Keith M. Martin, Josef Pieprzyk and Rei Safavi-Naini -- A Self-Certified Group-Oriented Cryptosystem Without a Combiner / Shahrokh Saeednia and Hossein Ghodosi -- Companion Viruses and the Macintosh: Threats and Countermeasures / Jeffrey Horton and Jennifer Seberry -- An Implementation of a Secure Version of NFS Including RBAC / Paul Ashley, Bradley Broom and Mark Vandenwauver -- Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems / Jacques Traore -- Efficient Electronic Cash Using Batch Signatures / Colin Boyd, Ernest Foo and Chris Pavlovski -- Evolution of Fair Non-repudiation with TTP / Jianying Zhou, Robert Deng and Feng Bao -- Authorization in Object Oriented Databases / Yun Bai and Vijay Varadharajan -- An Analysis of Access Control Models / Gregory Saunders, Michael Hitchens and Vijay Varadharajan -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems / Arjen K. Lenstra -- Characterization of Optimal Authentication Codes with Arbitration / Dingyi Pei, Yuqiang Li and Yejing Wang -- A Functional Cryptosystem Using a Group Action / Akihiro Yamamura
Summary This book constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP'99, held in Wollongong, NSW, Australia in April 1999. The 26 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The book is divided in topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, electronic commerce, address control, and odds and ends
Bibliography Includes bibliographical references and index
Notes Also available in print
Mode of access: World Wide Web
Subject Algorithms.
Computer networks.
Computer science.
Computer security -- Congresses.
Computer security.
Computer software.
Data encryption (Computer science)
Data protection -- Congresses.
Data protection.
Operating systems (Computers)
Privacy, Right of -- Congresses.
Privacy, Right of.
Genre/Form Conference papers and proceedings.
Author Pieprzyk, Josef, 1949-
Safavi-Naini, Reihanah.
Seberry, Jennifer, 1944-
LC no. 99020761
ISBN 3540657568 (softcover : alk. paper)