Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings /
The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- vers...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2004.
|
Σειρά: | Lecture Notes in Computer Science,
3108 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Broadcast Encryption and Traitor Tracing
- Multi-service Oriented Broadcast Encryption
- Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme
- Linear Code Implies Public-Key Traitor Tracing with Revocation
- TTS without Revocation Capability Secure Against CCA2
- Private Information Retrieval and Oblivious Transfer
- Single Database Private Information Retrieval with Logarithmic Communication
- Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions
- Trust and Secret Sharing
- Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
- NGSCB: A Trusted Open System
- Cryptanalysis (I)
- The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers
- Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
- The Related-Key Rectangle Attack – Application to SHACAL-1
- Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1
- The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders
- Cryptanalysis (II)
- Analysis of a Conference Scheme Under Active and Passive Attacks
- Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
- Analysis and Improvement of Micali’s Fair Contract Signing Protocol
- Digital Signatures (I)
- Digital Signature Schemes with Domain Parameters
- Generic Construction of Certificateless Signature
- Cryptosystems (I)
- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
- How to Re-use Round Function in Super-Pseudorandom Permutation
- How to Remove MAC from DHIES
- Symmetric Key Authentication Services Revisited
- Fast Computation
- Improvements to the Point Halving Algorithm
- Theoretical Analysis of XL over Small Fields
- A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
- Mobile Agents Security
- A Mobile Agent System Providing Offer Privacy
- Digital Signatures (II)
- Identity-Based Strong Designated Verifier Signature Schemes
- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
- A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups
- Convertible Nominative Signatures
- Protocols
- Protocols with Security Proofs for Mobile Applications
- Secure Bilinear Diffie-Hellman Bits
- Weak Property of Malleability in NTRUSign
- Security Management
- Information Security Risk Assessment, Aggregation, and Mitigation
- Access Control and Authorisation
- A Weighted Graph Approach to Authorization Delegation and Conflict Resolution
- Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
- Cryptosystems (II)
- Unconditionally Secure Encryption Under Strong Attacks
- ManTiCore: Encryption with Joint Cipher-State Authentication
- Cryptanalysis (III)
- On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
- On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks
- Fault Attacks on Signature Schemes.