Information Security and Privacy 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Pieprzyk, Josef (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Safavi-Naini, Rei (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Seberry, Jennifer (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
Έκδοση:1st ed. 1999.
Σειρά:Lecture Notes in Computer Science, 1587
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Boolean Functions
  • Boolean Function Design Using Hill Climbing Methods
  • Enumeration of Correlation Immune Boolean Functions
  • On the Symmetric Property of Homogeneous Boolean Functions
  • Key Management
  • Publicly Verifiable Key Escrow with Limited Time Span
  • Accelerating Key Establishment Protocols for Mobile Communication
  • Conference Key Agreement from Secret Sharing
  • Cryptanalysis
  • On m-Permutation Protection Scheme against Modification Attack
  • Inversion Attack and Branching
  • Signatures
  • Fail-Stop Threshold Signature Schemes Based on Elliptic Curves
  • Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature
  • Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes
  • RSA Cryptosystems
  • On the Security of an RSA Based Encryption Scheme
  • Generalised Cycling Attacks on RSA and Strong RSA Primes
  • RSA Acceleration with Field Programmable Gate Arrays
  • Group Cryptography
  • Changing Thresholds in the Absence of Secure Channels
  • A Self-Certified Group-Oriented Cryptosystem without a Combiner
  • Network Security
  • Companion Viruses and the Macintosh: Threats and Countermeasures
  • An Implementation of a Secure Version of NFS Including RBAC
  • Electronic Commerce
  • Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems
  • Effient Electronic Cash Using Batch Signatures
  • Evolution of Fair Non-repudiation with TTP
  • Access Control
  • Authorization in Object Oriented Databases
  • An Analysis of Access Control Models
  • Odds and Ends
  • Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems
  • Characterization of Optimal Authentication Codes with Arbitration
  • A Functional Cryptosystem Using a Group Action.