03893oam 2200661 450 99646562550331620210728234329.01-280-80455-697866108045593-540-48970-310.1007/3-540-48970-3(CKB)1000000000211106(EBL)3036574(SSID)ssj0000299649(PQKBManifestationID)11229116(PQKBTitleCode)TC0000299649(PQKBWorkID)10243156(PQKB)10521451(DE-He213)978-3-540-48970-2(MiAaPQ)EBC3036574(MiAaPQ)EBC6491973(PPN)155176749(EXLCZ)99100000000021110620210728d1999 uy 0engur|n|---|||||txtccrInformation security and privacy 12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings /edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry1st ed. 1999.Berlin, Germany ;New York, New York :Springer,[1999]©19991 online resource (336 p.)Lecture Notes in Computer Science,0302-9743 ;1587Description based upon print version of record.3-540-65756-8 Includes bibliographical references and index.Boolean Functions -- Boolean Function Design Using Hill Climbing Methods -- Enumeration of Correlation Immune Boolean Functions -- On the Symmetric Property of Homogeneous Boolean Functions -- Key Management -- Publicly Verifiable Key Escrow with Limited Time Span -- Accelerating Key Establishment Protocols for Mobile Communication -- Conference Key Agreement from Secret Sharing -- Cryptanalysis -- On m-Permutation Protection Scheme against Modification Attack -- Inversion Attack and Branching -- Signatures -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature -- Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes -- RSA Cryptosystems -- On the Security of an RSA Based Encryption Scheme -- Generalised Cycling Attacks on RSA and Strong RSA Primes -- RSA Acceleration with Field Programmable Gate Arrays -- Group Cryptography -- Changing Thresholds in the Absence of Secure Channels -- A Self-Certified Group-Oriented Cryptosystem without a Combiner -- Network Security -- Companion Viruses and the Macintosh: Threats and Countermeasures -- An Implementation of a Secure Version of NFS Including RBAC -- Electronic Commerce -- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems -- Effient Electronic Cash Using Batch Signatures -- Evolution of Fair Non-repudiation with TTP -- Access Control -- Authorization in Object Oriented Databases -- An Analysis of Access Control Models -- Odds and Ends -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems -- Characterization of Optimal Authentication Codes with Arbitration -- A Functional Cryptosystem Using a Group Action.Lecture Notes in Computer Science,0302-9743 ;1587Privacy, Right ofCongressesData protectionCongressesComputer securityCongressesPrivacy, Right ofData protectionComputer security005.8Pieprzyk Josef1946-Seberry Jennifer1944-Safavi-Naini ReihanahACISP '99MiAaPQMiAaPQUtOrBLWBOOK996465625503316Information Security and Privacy2569701UNISA