Information Security and Privacy 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2001.
|
Έκδοση: | 1st ed. 2001. |
Σειρά: | Lecture Notes in Computer Science,
2119 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- A Few Thoughts on E-Commerce
- New CBC-MAC Forgery Attacks
- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
- Improved Cryptanalysis of the Self-Shrinking Generator
- Attacks Based on Small Factors in Various Group Structures
- On Classifying Conference Key Distribution Protocols
- Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI
- New Public-Key Cryptosystem Using Divisor Class Groups
- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
- Practical Key Recovery Schemes
- Non-deterministic Processors
- Personal Secure Booting
- Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules
- A Strategy for MLS Workflow
- Condition-Driven Integration of Security Services
- SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes
- Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
- Private Information Retrieval Based on the Subgroup Membership Problem
- A Practical English Auction with One-Time Registration
- A User Authentication Scheme with Identity and Location Privacy
- An End-to-End Authentication Protocol in Wireless Application Protocol
- Error Detection and Authentication in Quantum Key Distribution
- An Axiomatic Basis for Reasoning about Trust in PKIs
- A Knowledge-Based Approach to Internet Authorizations
- Applications of Trusted Review to Information Security
- Network Security Modeling and Cyber Attack Simulation Methodology
- Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks
- Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS
- Improving the Availability of Time-Stamping Services
- Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group
- Democratic Systems
- Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme
- Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates
- How to Construct Fail-Stop Confirmer Signature Schemes
- Signature Schemes Based on 3rd Order Shift Registers
- Anonymous Statistical Survey of Attributes
- Secure Mobile Agent Using Strong Non-designated Proxy Signature
- Elliptic Curve Based Password Authenticated Key Exchange Protocols
- Elliptic Curve Cryptography on a Palm OS Device
- Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.