Limit search to available items
Book Cover
Book
Author ACISP 2002 (Conference) (2002 : Melbourne, Vic.)

Title Information security and privacy : 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings / Lynn Batten, Jennifer Seberry (eds.)
Published New York ; London : Springer, [2002]
©2002

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Aci/Isa 2002  AVAILABLE
 ADPML SPDU  005.8 Aci/Isa 2002  LIB USE ONLY
Description xii, 514 pages : fig., tables ; 24 cm
Series Lecture notes in computer science, 0302-9743 ; 2384
Lecture notes in computer science ; 2384
Contents A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields / Ingrid Biehl and Tsuyoshi Takagi -- Security Analysis and Improvement of the Global Key Recovery System / Yanjiang Yang, Feng Bao and Robert H. Deng -- The LILI-II Keystream Generator / A. Clark, Ed Dawson, J. Fuller, J. Golic, H.-J. Lee, William Millan, S.-J. Moon and L. Simpson -- A Secure Re-keying Scheme with Key Recovery Property / Hartono Kurnio, Rei Safavi-Naini and Huaxiong Wang -- Modelling Trust, Structures for Public Key Infrastructures / Marie Henderson, Robert Coulter, Ed Dawson and Eiji Okamoto -- Size of Broadcast in Threshold Schemes with Disenrollment / S. G. Barwick, W.-A. Jackson, Keith M. Martin and Peter R. Wild -- Requirements for Group Independent Linear Threshold Secret Sharing Schemes / Brian King -- Efficient Sharing of Encrypted Data / Krista Bennett, Christian Grothoff, Tzvetan Horozov and Ioana Patrascu -- Cheating Prevention in Linear Secret Sharing / Josef Pieprzyk and Xian-Mo Zhang -- Note on Fast Computation of Secret RSA Exponents / Wieland Fischer and Jean-Pierre Seifert -- Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying / Leonid Reyzin and Natan Reyzin -- Cryptanalysis of Stream Cipher COS (2, 128) Mode I / Hongjun Wu and Feng Bao -- The Analysis of Zheng-Seberry Scheme / David Soldera, Jennifer Seberry and Chengxin Qu -- Cryptanalysis of Stream Cipher Alpha1 / Hongjun Wu -- A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem / James Hughes -- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over F[subscript q] / Y. Choie and D. Yun -- Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems / Fangguo Zhang, Shengli Liu and Kwangjo Kim -- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis / Yvonne Hitchcock and Paul Montague -- Strengthening the Key Schedule of the AES / Lauren May, Matt Henricksen, William Millan, Gary Carter and Ed Dawson -- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes / Ron Steinfeld, Joonsang Baek and Yuliang Zheng -- Security Management: An Information Systems Setting / M. J. Warren and L. M. Batten -- Resolving Conflicts in Authorization Delegations / Chun Ruan and Vijay Varadharajan -- Policy Administration Domains / M. Hitchens, Vijay Varadharajan and G. Saunders -- Maintaining the Validity of Digital Signatures in B2B Applications / Jianying Zhou -- Short 3-Secure Fingerprinting Codes for Copyright Protection / Francesc Sebe and Josep Domingo-Ferrer -- An Order-Specified Multisignature Scheme Secure against Active Insider Attacks / Mitsuru Tada -- Authenticated Operation of Open Computing Devices / Paul England and Marcus Peinado -- A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem / Myungsun Kim and Kwangjo Kim -- A Brief Outline of Research on Correlation Immune Functions / Bimal Roy -- m out of n Oblivious Transfer / Yi Mu, Junqi Zhang and Vijay Varadharajan -- On the Security of Reduced Versions of 3-Pass HAVAL / Sangwoo Park, Soo Hak Sung, Seongtaek Chee and Jongin Lim -- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling / Katsuyuki Okeya and Kouichi Sakurai -- On the Security of a Modified Paillier Public-Key Primitive / Kouichi Sakurai and Tsuyoshi Takagi -- How to Play Sherlock Holmes in the World of Mobile Agents / Biljana Cubaleska, Weidong Qiu and Markus Schneider -- A Practical Approach Defeating Blackmailing / Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee and Hyung-Jim Yang -- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing / Hyun-Jeong Kim, Dong Hoon Lee and Moti Yung -- Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries / M. V. N. Ashwin Kumar, K. Srinathan and C. Pandu Rangan
Summary Constitutes the proceedings of the 7th Australasian Conference on Information Security and Privacy, held in Australia in 2002. The 37 papers cover key handling, trust and secret sharing, fast computation, cryptanalysis, elliptic curves, advanced encryption standard AES, authentication and more
Bibliography Includes bibliographic references and index
Notes Also available in print
Mode of access: World Wide Web
Subject Computer security -- Congresses.
Data protection -- Congresses.
Privacy, Right of -- Congresses.
Genre/Form Conference papers and proceedings.
Melbourne (2002)
Conference papers and proceedings.
Author Seberry, Jennifer, 1944-
Batten, Lynn Margaret.
LC no. 2002075477
ISBN 3540438610 paperback
Other Titles ACISP 2002