05955nam 22007575 450 991076755800332120200629130603.03-540-45030-010.1007/10718964(CKB)1000000000548838(SSID)ssj0000323999(PQKBManifestationID)11242564(PQKBTitleCode)TC0000323999(PQKBWorkID)10303980(PQKB)10326659(DE-He213)978-3-540-45030-6(MiAaPQ)EBC3088972(PPN)155231359(EXLCZ)99100000000054883820121227d2000 u| 0engurnn|008mamaatxtccrInformation Security and Privacy 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings /edited by Ed Dawson, Andrew Clark, Colin Boyd1st ed. 2000.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2000.1 online resource (XIII, 488 p.) Lecture Notes in Computer Science,0302-9743 ;1841Bibliographic Level Mode of Issuance: Monograph3-540-67742-9 Includes bibliographical references and index.Network Security I -- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System -- Towards a New Authorisation Paradigm for Extranets -- Custom Safety Policies in Safe Erlang -- Public Key Cryptography -- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring -- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption -- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance -- Network Security II -- High Performance Agile Crypto Modules -- A Three-Party HTTP Proxy to Support Internet Content Regulation -- Cryptographic Implementation Issues -- Cryptanalysis of the m – Permutation Protection Schemes -- An Implementation of Bitsliced DES on the Pentium MMXTM Processor -- Electronic Commerce I -- Securing Large E-Commerce Networks -- Passive Entities: A Strategy for Electronic Payment Design -- Key Recovery -- Key Recovery System for the Commercial Environment -- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication -- Public Key Infrastructure -- Key Management for Secure Multicast with Dynamic Controller -- PKI Seeks a Trusting Relationship -- The PKI Specification Dilemma: A Formal Solution -- Boolean Functions -- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator -- Security Weaknesses in a Randomized Stream Cipher -- Two-Stage Optimisation in the Design of Boolean Functions -- Intrusion Detection -- A Novel Engine for Various Intrusion Detection Methods -- Codes -- Construction and Categories of Codes -- Digital Signatures I -- Cryptanalysis of Polynomial Authentication and Signature Scheme -- Secure Transactions with Mobile Agents in Hostile Environments -- A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability -- Secret Sharing I -- Light Weight Broadcast Exclusion Using Secret Sharing -- Cheating Prevention in Secret Sharing -- On Multiplicative Secret Sharing Schemes -- Digital Signatures II -- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures -- Fail-Stop Confirmer Signatures -- An Extremely Small and Efficient Identification Scheme -- Protocols -- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme -- AKA Protocols for Mobile Communications -- Electronic Commerce II -- A Three Phased Schema for Sealed Bid Auction System Design -- An Online Public Auction Protocol Protecting Bidder Privacy -- Secret Sharing II -- Algorithms to Speed Up Computations in Threshold RSA -- Sharing Block Ciphers -- Keynote Papers -- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce -- Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society.Lecture Notes in Computer Science,0302-9743 ;1841Data encryption (Computer science)Computer communication systemsManagement information systemsComputer scienceOperating systems (Computers)AlgorithmsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Data encryption (Computer science).Computer communication systems.Management information systems.Computer science.Operating systems (Computers).Algorithms.Cryptology.Computer Communication Networks.Management of Computing and Information Systems.Operating Systems.Algorithm Analysis and Problem Complexity.005.8Dawson Ededthttp://id.loc.gov/vocabulary/relators/edtClark Andrewedthttp://id.loc.gov/vocabulary/relators/edtBoyd Colinedthttp://id.loc.gov/vocabulary/relators/edtACISP 2000BOOK9910767558003321Information Security and Privacy3395200UNINA