Limit search to available items
Book Cover
E-book
Author ACISP (Conference) (16th : 2011 : Melbourne, Vic.)

Title Information security and privacy : 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011 : proceedings / Udaya Parampalli, Philip Hawkes (eds.)
Published Heidelberg : Springer, 2011

Copies

Description 1 online resource (xiii, 464 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 6812
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6812. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Machine generated contents note: Invited Talks -- On Known and New Differentially Uniform Functions / Claude Carlet -- Symmetric Key Cryptography -- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256 / Xiaoyun Wang -- Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks / Dingyi Pei -- Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation / Fangguo Zhang -- Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis / Huaxiong Wang -- State Convergence in the Initialisation of Stream Ciphers / Ed Dawson -- On Maximum Differential Probability of Generalized Feistel / Maki Shigeri -- Double SP-Functions: Enhanced Generalized Feistel Networks: Extended Abstract / Kyoji Shibutani -- Algebraic Techniques in Differential Cryptanalysis Revisited / Bart Preneel -- Hash Functions -- Faster and Smoother VSH Revisited / Juraj Sarinay -- Cryptanalysis of the Compression Function of SIMD / Xiaoyun Wang -- Protocols -- Electronic Cash with Anonymous User Suspension / Yi Mu -- T-Robust Scalable Group Key Exchange Protocol with O(log n) complexity / Takashi Sato -- Application-Binding Protocol in the User Centric Smart Card Ownership Model / Keith Mayes -- Access Control and Security -- Security in Depth through Smart Space Cascades / Benjamin W. Long -- GeoEuc: Geometric Area Based Keys and Policies in Functional Encryption Systems / Tsuyoshi Takagi -- Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem / Huaxiong Wang -- DMIPS -- Defensive Mechanism against IP Spoofing / Kannan Srinathan -- Public Key Cryptography -- Provably Secure Key Assignment Schemes from Factoring / Kenneth G. Paterson -- Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key / Dingding Jia
Note continued: Generic Construction of Strongly Secure Timed-Release Public-Key Encryption / Taiichi Saito -- Identity-Based Server-Aided Decryption / Jianying Zhou -- Generic Variant of NIST's KAS2 Key Agreement Protocol / Berkant Ustaoglu -- Single Key Pair is Adequate for the Zheng Signcryption / Xiaohu Tang -- Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization / Qiang Tang -- Posters -- Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster) / Josef Pieprzyk -- Compliance or Security, What Cost? (Poster) / Craig Wright -- Preimage Attacks on Full-ARIRANG (Poster) / Takeshi Shimoyama -- Finding Collisions for Reduced Luffa-256 v2 (Poster) / Dai Watanabe -- Improved Security Analysis of Fugue-256 (Poster) / Lei Wei -- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster) / San Ling -- Toward Dynamic Attribute-Based Signcryption (Poster) / Mohammad Shahriar Rahman -- Verifiable Distributed Oblivious Transfer Protocol (Poster) / Hossein Ghodosi -- Impracticality of Efficient PVSS in Real Life Security Standard (Poster) / Kun Peng -- Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster) / Satoshi Goto
Summary Annotation This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography
Bibliography Includes bibliographical references and index
Notes English
In Springer eBooks
Subject Computer security -- Congresses
Operating systems (Computers)
operating systems.
Informatique.
Computer security
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Parampalli, Udaya
Hawkes, Philip.
LC no. 2011931295
ISBN 9783642224973
3642224970
Other Titles ACISP 2011