LEADER 03895oam 2200661 450 001 9910143452003321 005 20210728234329.0 010 $a1-280-80455-6 010 $a9786610804559 010 $a3-540-48970-3 024 7 $a10.1007/3-540-48970-3 035 $a(CKB)1000000000211106 035 $a(EBL)3036574 035 $a(SSID)ssj0000299649 035 $a(PQKBManifestationID)11229116 035 $a(PQKBTitleCode)TC0000299649 035 $a(PQKBWorkID)10243156 035 $a(PQKB)10521451 035 $a(DE-He213)978-3-540-48970-2 035 $a(MiAaPQ)EBC3036574 035 $a(MiAaPQ)EBC6491973 035 $a(PPN)155176749 035 $a(EXLCZ)991000000000211106 100 $a20210728d1999 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInformation security and privacy $e12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings /$fedited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry 205 $a1st ed. 1999. 210 1$aBerlin, Germany ;$aNew York, New York :$cSpringer,$d[1999] 210 4$d©1999 215 $a1 online resource (336 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1587 300 $aDescription based upon print version of record. 311 $a3-540-65756-8 320 $aIncludes bibliographical references and index. 327 $aBoolean Functions -- Boolean Function Design Using Hill Climbing Methods -- Enumeration of Correlation Immune Boolean Functions -- On the Symmetric Property of Homogeneous Boolean Functions -- Key Management -- Publicly Verifiable Key Escrow with Limited Time Span -- Accelerating Key Establishment Protocols for Mobile Communication -- Conference Key Agreement from Secret Sharing -- Cryptanalysis -- On m-Permutation Protection Scheme against Modification Attack -- Inversion Attack and Branching -- Signatures -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature -- Repudiation of Cheating and Non-repudiation of Zhang?s Proxy Signature Schemes -- RSA Cryptosystems -- On the Security of an RSA Based Encryption Scheme -- Generalised Cycling Attacks on RSA and Strong RSA Primes -- RSA Acceleration with Field Programmable Gate Arrays -- Group Cryptography -- Changing Thresholds in the Absence of Secure Channels -- A Self-Certified Group-Oriented Cryptosystem without a Combiner -- Network Security -- Companion Viruses and the Macintosh: Threats and Countermeasures -- An Implementation of a Secure Version of NFS Including RBAC -- Electronic Commerce -- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems -- Effient Electronic Cash Using Batch Signatures -- Evolution of Fair Non-repudiation with TTP -- Access Control -- Authorization in Object Oriented Databases -- An Analysis of Access Control Models -- Odds and Ends -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems -- Characterization of Optimal Authentication Codes with Arbitration -- A Functional Cryptosystem Using a Group Action. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1587 606 $aPrivacy, Right of$vCongresses 606 $aData protection$vCongresses 606 $aComputer security$vCongresses 615 0$aPrivacy, Right of 615 0$aData protection 615 0$aComputer security 676 $a005.8 702 $aPieprzyk$b Josef$f1946- 702 $aSeberry$b Jennifer$f1944- 702 $aSafavi-Naini$b Reihanah 712 12$aACISP '99 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910143452003321 996 $aInformation Security and Privacy$92569701 997 $aUNINA