Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings /

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Batten, Lynn Margaret (Επιμελητής έκδοσης), Safavi-Naini, Reihaneh (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4058
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Stream Ciphers
  • Algebraic Attacks on Clock-Controlled Stream Ciphers
  • Cache Based Power Analysis Attacks on AES
  • Distinguishing Attack on SOBER-128 with Linear Masking
  • Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks
  • Symmetric Key Ciphers
  • Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
  • Improved Cryptanalysis of MAG
  • On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
  • Network Security
  • Augmented Certificate Revocation Lists
  • Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
  • Towards an Invisible Honeypot Monitoring System
  • Cryptographic Applications
  • Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service
  • Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages
  • More on Stand-Alone and Setup-Free Verifiably Committed Signatures
  • Secure Implementation
  • API Monitoring System for Defeating Worms and Exploits in MS-Windows System
  • Hiding Circuit Topology from Unbounded Reverse Engineers
  • The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications
  • Signatures
  • Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
  • Efficient Identity-Based Signatures Secure in the Standard Model
  • Event-Oriented k-Times Revocable-iff-Linked Group Signatures
  • Key Replacement Attack Against a Generic Construction of Certificateless Signature
  • Theory
  • A Novel Range Test
  • Efficient Primitives from Exponentiation in ? p
  • PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
  • Statistical Decoding Revisited
  • Invited Talk
  • Towards Provable Security for Ubiquitous Applications
  • Security Applications
  • Oblivious Scalar-Product Protocols
  • On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases
  • Provable Security
  • Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
  • Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
  • Tag-KEM from Set Partial Domain One-Way Permutations
  • Protocols
  • An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
  • Graphical Representation of Authorization Policies for Weighted Credentials
  • Secure Cross-Realm C2C-PAKE Protocol
  • Hashing and Message Authentication
  • Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction
  • Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant
  • Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions.