LEADER 07276nam 22008295 450 001 9910768469703321 005 20200630015625.0 010 $a3-540-45067-X 024 7 $a10.1007/3-540-45067-X 035 $a(CKB)1000000000212079 035 $a(SSID)ssj0000324001 035 $a(PQKBManifestationID)11242565 035 $a(PQKBTitleCode)TC0000324001 035 $a(PQKBWorkID)10303633 035 $a(PQKB)11586409 035 $a(DE-He213)978-3-540-45067-2 035 $a(MiAaPQ)EBC3071617 035 $a(PPN)155220896 035 $a(EXLCZ)991000000000212079 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy$b[electronic resource] $e8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings /$fedited by Rei Safavi-Naini, Jennifer Seberry 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (XII, 540 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2727 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-40515-1 320 $aIncludes bibliographical references and index. 327 $aPrivacy and Anonymity -- Grouping Verifiable Content for Selective Disclosure -- Evaluation of Anonymity of Practical Anonymous Communication Networks -- An Anonymous Credential System and a Privacy-Aware PKI -- Flaws in Some Robust Optimistic Mix-Nets -- Invited Talk (I) -- The Unsolvable Privacy Problem and Its Implications for Security Technologies -- Elliptic Curves -- The Security of Fixed versus Random Elliptic Curves in Cryptography -- Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains -- Generic GF(2m) Arithmetic in Software and Its Application to ECC -- An Addition Algorithm in Jacobian of C 34 Curve -- Crytpanalysis (I) -- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces -- Differential Fault Analysis on AES Key Schedule and Some Countermeasures -- On the Pseudorandomness of KASUMI Type Permutations -- Theoretical Analysis of ?2 Attack on RC6 -- Mobile and Network Security -- A Typed Theory for Access Control and Information Flow Control in Mobile Systems -- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach -- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications -- Practical Pay TV Schemes -- Cooperative Routers against DoS Attacks -- Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs -- Malicious ICMP Tunneling: Defense against the Vulnerability -- On Fair E-cash Systems Based on Group Signature Schemes -- Invited Talk (II) -- A Taxonomy of Single Sign-On Systems -- Cryptanalysis (II) -- Key Recovery Attacks on the RMAC, TMAC, and IACBC -- Key Recovery Attacks on NTRU without Ciphertext Validation Routine -- Permanent Fault Attack on the Parameters of RSA with CRT -- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts -- Signature -- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings -- Digital Signature Schemes with Restriction on Signing Capability -- On the Exact Security of Multi-signature Schemes Based on RSA -- Cryptosystems (I) -- A Length-Flexible Threshold Cryptosystem with Applications -- Separating Encryption and Key Issuance in Digital Rights Management Systems -- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers -- Parallel Authentication and Public-Key Encryption -- Invited Talk (III) -- Is Cross-Platform Security Possible? -- Cryptosystems (II) -- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems -- Cryptanalysis of a New Cellular Automata Cryptosystem -- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers -- Clock-Controlled Shrinking Generator of Feedback Shift Registers -- Key Management -- EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange -- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join -- Robust Software Tokens ? Yet Another Method for Securing User?s Digital Identity -- Theory and Hash Functions -- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders -- New Constructions for Resilient and Highly Nonlinear Boolean Functions -- On Parallel Hash Functions Based on Block-Cipher -- Square Hash with a Small Key Size. 330 $a This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2727 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aCoding theory 606 $aInformation theory 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aCoding and Information Theory. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aSafavi-Naini$b Rei$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSeberry$b Jennifer$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aACISP 2003 906 $aBOOK 912 $a9910768469703321 996 $aInformation Security and Privacy$93395200 997 $aUNINA