Description |
327 unnumbered pages : illustrations |
Series |
Lecture notes in computer science ; 1587 |
|
Lecture notes in computer science ; 1587
|
Contents |
Boolean Function Design Using Hill Climbing Methods / William Millan, Andrew Clark and Ed Dawson -- Enumeration of Correlation Immune Boolean Functions / Subhamoy Maitra and Palash Sarkar -- On the Symmetric Property of Homogeneous Boolean Functions / Chengxin Qu, Jennifer Seberry and Josef Pieprzyk -- Publicly Verifiable Key Escrow with Limited Time Span / Kapali Viswanathan, Colin Boyd and Ed Dawson -- Accelerating Key Establishment Protocols for Mobile Communication / Seungwon Lee, Seong-Min Hong and Hyunsoo Yoon -- Conference Key Agreement from Secret Sharing / Chih-Hung Li and Josef Pieprzyk -- On m-Permutation Protection Scheme Against Modification Attack / W. W. Fung and J. W. Gray III -- Inversion Attack and Branching / Jovan Dj. Golic, Andrew Clark and Ed Dawson -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves / Willy Susilo, Rei Safavi-Naini and Josef Pieprzyk -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature / Khanh Quoc Nguyen, Yi Mu and Vijay Varadharajan -- Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes / Hossein Ghodosi and Josef Pieprzyk -- On the Security of an RSA Based Encryption Scheme / Siguna Muller -- Generalised Cycling Attacks on RSA and Strong RSA Primes / Marc Gysin and Jennifer Seberry -- RSA Acceleration with Field Programmable Gate Arrays / Alexander Tiountchik and Elena Trichina -- Changing Thresholds in the Absence of Secure Channels / Keith M. Martin, Josef Pieprzyk and Rei Safavi-Naini -- A Self-Certified Group-Oriented Cryptosystem Without a Combiner / Shahrokh Saeednia and Hossein Ghodosi -- Companion Viruses and the Macintosh: Threats and Countermeasures / Jeffrey Horton and Jennifer Seberry -- An Implementation of a Secure Version of NFS Including RBAC / Paul Ashley, Bradley Broom and Mark Vandenwauver -- Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems / Jacques Traore -- Efficient Electronic Cash Using Batch Signatures / Colin Boyd, Ernest Foo and Chris Pavlovski -- Evolution of Fair Non-repudiation with TTP / Jianying Zhou, Robert Deng and Feng Bao -- Authorization in Object Oriented Databases / Yun Bai and Vijay Varadharajan -- An Analysis of Access Control Models / Gregory Saunders, Michael Hitchens and Vijay Varadharajan -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems / Arjen K. Lenstra -- Characterization of Optimal Authentication Codes with Arbitration / Dingyi Pei, Yuqiang Li and Yejing Wang -- A Functional Cryptosystem Using a Group Action / Akihiro Yamamura |
Summary |
This book constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP'99, held in Wollongong, NSW, Australia in April 1999. The 26 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The book is divided in topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, electronic commerce, address control, and odds and ends |
Bibliography |
Includes bibliographical references and index |
Notes |
Also available in print |
|
Mode of access: World Wide Web |
Subject |
Algorithms.
|
|
Computer networks.
|
|
Computer science.
|
|
Computer security -- Congresses.
|
|
Computer security.
|
|
Computer software.
|
|
Data encryption (Computer science)
|
|
Data protection -- Congresses.
|
|
Data protection.
|
|
Operating systems (Computers)
|
|
Privacy, Right of -- Congresses.
|
|
Privacy, Right of.
|
Genre/Form |
Conference papers and proceedings.
|
Author |
Pieprzyk, Josef, 1949-
|
|
Safavi-Naini, Reihanah.
|
|
Seberry, Jennifer, 1944-
|
LC no. |
99020761 |
ISBN |
3540657568 (softcover : alk. paper) |
|