Information Security and Privacy 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
1999.
|
Έκδοση: | 1st ed. 1999. |
Σειρά: | Lecture Notes in Computer Science,
1587 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Boolean Functions
- Boolean Function Design Using Hill Climbing Methods
- Enumeration of Correlation Immune Boolean Functions
- On the Symmetric Property of Homogeneous Boolean Functions
- Key Management
- Publicly Verifiable Key Escrow with Limited Time Span
- Accelerating Key Establishment Protocols for Mobile Communication
- Conference Key Agreement from Secret Sharing
- Cryptanalysis
- On m-Permutation Protection Scheme against Modification Attack
- Inversion Attack and Branching
- Signatures
- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves
- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature
- Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes
- RSA Cryptosystems
- On the Security of an RSA Based Encryption Scheme
- Generalised Cycling Attacks on RSA and Strong RSA Primes
- RSA Acceleration with Field Programmable Gate Arrays
- Group Cryptography
- Changing Thresholds in the Absence of Secure Channels
- A Self-Certified Group-Oriented Cryptosystem without a Combiner
- Network Security
- Companion Viruses and the Macintosh: Threats and Countermeasures
- An Implementation of a Secure Version of NFS Including RBAC
- Electronic Commerce
- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems
- Effient Electronic Cash Using Batch Signatures
- Evolution of Fair Non-repudiation with TTP
- Access Control
- Authorization in Object Oriented Databases
- An Analysis of Access Control Models
- Odds and Ends
- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems
- Characterization of Optimal Authentication Codes with Arbitration
- A Functional Cryptosystem Using a Group Action.