Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings /
The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4058 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Stream Ciphers
- Algebraic Attacks on Clock-Controlled Stream Ciphers
- Cache Based Power Analysis Attacks on AES
- Distinguishing Attack on SOBER-128 with Linear Masking
- Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks
- Symmetric Key Ciphers
- Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
- Improved Cryptanalysis of MAG
- On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
- Network Security
- Augmented Certificate Revocation Lists
- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
- Towards an Invisible Honeypot Monitoring System
- Cryptographic Applications
- Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service
- Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages
- More on Stand-Alone and Setup-Free Verifiably Committed Signatures
- Secure Implementation
- API Monitoring System for Defeating Worms and Exploits in MS-Windows System
- Hiding Circuit Topology from Unbounded Reverse Engineers
- The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications
- Signatures
- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
- Efficient Identity-Based Signatures Secure in the Standard Model
- Event-Oriented k-Times Revocable-iff-Linked Group Signatures
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Theory
- A Novel Range Test
- Efficient Primitives from Exponentiation in ? p
- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
- Statistical Decoding Revisited
- Invited Talk
- Towards Provable Security for Ubiquitous Applications
- Security Applications
- Oblivious Scalar-Product Protocols
- On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases
- Provable Security
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Tag-KEM from Set Partial Domain One-Way Permutations
- Protocols
- An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
- Graphical Representation of Authorization Policies for Weighted Credentials
- Secure Cross-Realm C2C-PAKE Protocol
- Hashing and Message Authentication
- Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction
- Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant
- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions.