Information Security and Privacy 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings /

This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 su...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Safavi-Naini, Rei (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Seberry, Jennifer (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2727
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06644nam a2200637 4500
001 978-3-540-45067-2
003 DE-He213
005 20191023181152.0
007 cr nn 008mamaa
008 121227s2003 gw | s |||| 0|eng d
020 |a 9783540450672  |9 978-3-540-45067-2 
024 7 |a 10.1007/3-540-45067-X  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D335 
072 7 |a GPJ  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.82  |2 23 
245 1 0 |a Information Security and Privacy  |h [electronic resource] :  |b 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings /  |c edited by Rei Safavi-Naini, Jennifer Seberry. 
250 |a 1st ed. 2003. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2003. 
300 |a XII, 540 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2727 
505 0 |a Privacy and Anonymity -- Grouping Verifiable Content for Selective Disclosure -- Evaluation of Anonymity of Practical Anonymous Communication Networks -- An Anonymous Credential System and a Privacy-Aware PKI -- Flaws in Some Robust Optimistic Mix-Nets -- Invited Talk (I) -- The Unsolvable Privacy Problem and Its Implications for Security Technologies -- Elliptic Curves -- The Security of Fixed versus Random Elliptic Curves in Cryptography -- Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains -- Generic GF(2m) Arithmetic in Software and Its Application to ECC -- An Addition Algorithm in Jacobian of C 34 Curve -- Crytpanalysis (I) -- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces -- Differential Fault Analysis on AES Key Schedule and Some Countermeasures -- On the Pseudorandomness of KASUMI Type Permutations -- Theoretical Analysis of ?2 Attack on RC6 -- Mobile and Network Security -- A Typed Theory for Access Control and Information Flow Control in Mobile Systems -- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach -- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications -- Practical Pay TV Schemes -- Cooperative Routers against DoS Attacks -- Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs -- Malicious ICMP Tunneling: Defense against the Vulnerability -- On Fair E-cash Systems Based on Group Signature Schemes -- Invited Talk (II) -- A Taxonomy of Single Sign-On Systems -- Cryptanalysis (II) -- Key Recovery Attacks on the RMAC, TMAC, and IACBC -- Key Recovery Attacks on NTRU without Ciphertext Validation Routine -- Permanent Fault Attack on the Parameters of RSA with CRT -- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts -- Signature -- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings -- Digital Signature Schemes with Restriction on Signing Capability -- On the Exact Security of Multi-signature Schemes Based on RSA -- Cryptosystems (I) -- A Length-Flexible Threshold Cryptosystem with Applications -- Separating Encryption and Key Issuance in Digital Rights Management Systems -- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers -- Parallel Authentication and Public-Key Encryption -- Invited Talk (III) -- Is Cross-Platform Security Possible? -- Cryptosystems (II) -- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems -- Cryptanalysis of a New Cellular Automata Cryptosystem -- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers -- Clock-Controlled Shrinking Generator of Feedback Shift Registers -- Key Management -- EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange -- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join -- Robust Software Tokens - Yet Another Method for Securing User's Digital Identity -- Theory and Hash Functions -- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders -- New Constructions for Resilient and Highly Nonlinear Boolean Functions -- On Parallel Hash Functions Based on Block-Cipher -- Square Hash with a Small Key Size. 
520 |a  This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer communication systems. 
650 0 |a Operating systems (Computers). 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Algorithms. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 1 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
650 2 4 |a Coding and Information Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/I15041 
650 2 4 |a Algorithm Analysis and Problem Complexity.  |0 http://scigraph.springernature.com/things/product-market-codes/I16021 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
700 1 |a Safavi-Naini, Rei.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Seberry, Jennifer.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662171349 
776 0 8 |i Printed edition:  |z 9783540405153 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2727 
856 4 0 |u https://doi.org/10.1007/3-540-45067-X  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)