Information Security and Privacy 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings /

The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3-5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Batten, Lynn (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Seberry, Jennifer (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2384
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Key Handling
  • A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields
  • Security Analysis and Improvement of the Global Key Recovery System
  • The LILI-II Keystream Generator
  • A Secure Re-keying Scheme with Key Recovery Property
  • Trust and Secret Sharing
  • Modelling Trust Structures for Public Key Infrastructures
  • Size of Broadcast in Threshold Schemes with Disenrollment
  • Requirements for Group Independent Linear Threshold Secret Sharing Schemes
  • Efficient Sharing of Encrypted Data
  • Cheating Prevention in Linear Secret Sharing
  • Fast Computation
  • Note on Fast Computation of Secret RSA Exponents
  • Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
  • Cryptanalysis I
  • Cryptanalysis of Stream Cipher COS (2, 128) Mode I
  • The Analysis of Zheng-Seberry Scheme
  • Cryptanalysis of Stream Cipher Alpha1
  • A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem
  • Elliptic Curves
  • Isomorphism Classes of Hyperelliptic Curves of Genus 2 over
  • Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems
  • A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis
  • AES
  • Strengthening the Key Schedule of the AES
  • On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes
  • Security Management
  • Security Management: An Information Systems Setting
  • Resolving Conflicts in Authorization Delegations
  • Policy Administration Domains
  • Authentication
  • Maintaining the Validity of Digital Signatures in B2B Applications
  • Short 3-Secure Fingerprinting Codes for Copyright Protection
  • An Order-Specified Multisignature Scheme Secure against Active Insider Attacks
  • Authenticated Operation of Open Computing Devices
  • A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
  • Invited Talk
  • A Brief Outline of Research on Correlation Immune Functions
  • Oblivious Transfer
  • m out of n Oblivious Transfer
  • Cryptanalysis II
  • On the Security of Reduced Versions of 3-Pass HAVAL
  • On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
  • On the Security of a Modified Paillier Public-Key Primitive
  • Dealing with Adversaries
  • How to Play Sherlock Holmes in the World of Mobile Agents
  • A Practical Approach Defeating Blackmailing
  • Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
  • Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.