LEADER 01302nas a2200313 i 4500 001 991002667099707536 005 20240610130741.0 008 011205m19399999 || | |eng 022 $a0075-4390 035 $ab11691268-39ule_inst 035 $aPERLE004968$9ExL 080 $aCDU 820 229 0$aJournal of the Warburg and Courtauld Institutes 245 00$aJournal of the Warburg and Courtauld Institutes /$cUniversity of London, Warburg Institute, Courtauld Institute. - 1939- 260 $aLondon,$c1939- 591 $aCodice CNR: P 00062208 592 $aLE002 1939- 592 $aLE009 1949; 1956; 710 2 $aUniversity :$bWarburg Institute 710 2 $aUniversity :$bCourtauld Institute of art 780 00$tJournal of the Warburg Institute 907 $a.b11691268$b20-10-10$c08-07-02 912 $a991002667099707536 945 $aLE002 SP 700$g1$lle002$o-$pE0.00$q-$rn$so$t18$u0$v0$w0$x0$y.i11921523$z08-07-02 945 $ca. 2003$g1$lle002$o-$pE42.00$q-$rn$so$t18$u0$v0$w0$x0$y.i14004021$z10-02-05 945 $aLE009 Per. Arte 90$g1$lle009$o-$pE0.00$q-$rn$so$t18$u0$v0$w0$x0$y.i11921535$z08-07-02 996 $aJournal of the Warburg and Courtauld Institutes$9791482 997 $aUNISALENTO 998 $a(2)le002$ale009$b01-01-01$cs$da$e-$feng$guk$h0$i3 LEADER 05472nam 22009015 450 001 9910484305203321 005 20251226202902.0 010 $a3-642-02620-6 024 7 $a10.1007/978-3-642-02620-1 035 $a(CKB)1000000000753977 035 $a(SSID)ssj0000318279 035 $a(PQKBManifestationID)11231736 035 $a(PQKBTitleCode)TC0000318279 035 $a(PQKBWorkID)10308554 035 $a(PQKB)10271188 035 $a(DE-He213)978-3-642-02620-1 035 $a(MiAaPQ)EBC3064361 035 $a(PPN)136306993 035 $a(EXLCZ)991000000000753977 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy $e14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings /$fedited by Colin Boyd, Juan González Nieto 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XI, 470 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5594 300 $aDescription based on print version record. 311 08$a3-642-02619-2 320 $aIncludes bibliographical references and index. 327 $aInvited Lecture -- Is the Information Security King Naked? -- Network Security -- Measurement Study on Malicious Web Servers in the .nz Domain -- A Combinatorial Approach for an Anonymity Metric -- On Improving the Accuracy and Performance of Content-Based File Type Identification -- Symmetric Key Encryption -- Attacking 9 and 10 Rounds of AES-256 -- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure -- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT -- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher -- Testing Stream Ciphers by Finding the Longest Substring of a Given Density -- New Correlations of RC4 PRGA Using Nonzero-Bit Differences -- Hash Functions -- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders -- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security -- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 -- Inside the Hypercube -- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others -- On the Weak Ideal Compression Functions -- Invited Lecture -- Hardening the Network from the Friend Within -- Public Key Cryptography -- Reducing the Complexity in the Distributed Computation of Private RSA Keys -- Efficiency Bounds for Adversary Constructions in Black-Box Reductions -- Building Key-Private Public-Key Encryption Schemes -- Multi-recipient Public-Key Encryption from Simulators in Security Proofs -- Fair Threshold Decryption with Semi-Trusted Third Parties -- Conditional Proxy Broadcast Re-Encryption -- Security on Hybrid Encryption with the Tag-KEM/DEM Framework -- Protocols -- A Highly Scalable RFID Authentication Protocol -- Strengthening the Securityof Distributed Oblivious Transfer -- Towards Denial-of-Service-Resilient Key Agreement Protocols -- A Commitment-Consistent Proof of a Shuffle -- Implementation -- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography -- Random Order m-ary Exponentiation -- Jacobi Quartic Curves Revisited. 330 $aThis book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009, held in Brisbane, Australia, during July 1-3, 2009. The 29 revised full papers presented together with two invited talks were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on network security, symmetric key encryption, hash functions, public key cryptography, protocols, and implementation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5594 606 $aComputer networks 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aCoding theory 606 $aInformation theory 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aCryptology 606 $aIT Operations 606 $aCoding and Information Theory 606 $aAlgorithms 615 0$aComputer networks. 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgorithms. 615 14$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aCoding and Information Theory. 615 24$aAlgorithms. 676 $a004.6 686 $aDAT 050f$2stub 686 $aDAT 460f$2stub 686 $aSS 4800$2rvk 701 $aBoyd$b Colin$f1959-$0736380 701 $aGonzalez Nieto$b Juan M$01754284 712 12$aACISP 2009 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484305203321 996 $aInformation security and privacy$94190530 997 $aUNINA