Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings /

The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- vers...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Wang, Huaxiong (Επιμελητής έκδοσης), Pieprzyk, Josef (Επιμελητής έκδοσης), Varadharajan, Vijay (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2004.
Σειρά:Lecture Notes in Computer Science, 3108
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Broadcast Encryption and Traitor Tracing
  • Multi-service Oriented Broadcast Encryption
  • Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme
  • Linear Code Implies Public-Key Traitor Tracing with Revocation
  • TTS without Revocation Capability Secure Against CCA2
  • Private Information Retrieval and Oblivious Transfer
  • Single Database Private Information Retrieval with Logarithmic Communication
  • Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions
  • Trust and Secret Sharing
  • Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
  • NGSCB: A Trusted Open System
  • Cryptanalysis (I)
  • The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers
  • Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
  • The Related-Key Rectangle Attack – Application to SHACAL-1
  • Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1
  • The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders
  • Cryptanalysis (II)
  • Analysis of a Conference Scheme Under Active and Passive Attacks
  • Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
  • Analysis and Improvement of Micali’s Fair Contract Signing Protocol
  • Digital Signatures (I)
  • Digital Signature Schemes with Domain Parameters
  • Generic Construction of Certificateless Signature
  • Cryptosystems (I)
  • A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
  • How to Re-use Round Function in Super-Pseudorandom Permutation
  • How to Remove MAC from DHIES
  • Symmetric Key Authentication Services Revisited
  • Fast Computation
  • Improvements to the Point Halving Algorithm
  • Theoretical Analysis of XL over Small Fields
  • A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
  • Mobile Agents Security
  • A Mobile Agent System Providing Offer Privacy
  • Digital Signatures (II)
  • Identity-Based Strong Designated Verifier Signature Schemes
  • Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
  • A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups
  • Convertible Nominative Signatures
  • Protocols
  • Protocols with Security Proofs for Mobile Applications
  • Secure Bilinear Diffie-Hellman Bits
  • Weak Property of Malleability in NTRUSign
  • Security Management
  • Information Security Risk Assessment, Aggregation, and Mitigation
  • Access Control and Authorisation
  • A Weighted Graph Approach to Authorization Delegation and Conflict Resolution
  • Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
  • Cryptosystems (II)
  • Unconditionally Secure Encryption Under Strong Attacks
  • ManTiCore: Encryption with Joint Cipher-State Authentication
  • Cryptanalysis (III)
  • On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
  • On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks
  • Fault Attacks on Signature Schemes.