LEADER 05767nam 22007935 450 001 996465754103316 005 20200705205632.0 010 $a3-540-69237-1 024 7 $a10.1007/BFb0027916 035 $a(CKB)1000000000234670 035 $a(SSID)ssj0000324003 035 $a(PQKBManifestationID)11250833 035 $a(PQKBTitleCode)TC0000324003 035 $a(PQKBWorkID)10318953 035 $a(PQKB)11620035 035 $a(DE-He213)978-3-540-69237-9 035 $a(PPN)155202480 035 $a(EXLCZ)991000000000234670 100 $a20121227d1997 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy$b[electronic resource] $eSecond Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings /$fedited by Vijav Varadharajan, Josef Pieprzyk, Yi Mu 205 $a1st ed. 1997. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1997. 215 $a1 online resource (XIII, 343 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1270 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-63232-8 327 $aTrusted third parties for secure electronic commerce ? Are they needed -- Prospectives for modelling trust in information security -- Analysis and implementation of a formal authorization policy design approach -- An approach to dynamic domain and type enforcement -- Purpose-oriented access control model in object-based systems -- User Access Domain Management System-ADAMS -- Revocation of unread e-mail in an untrusted network -- Security issues in asynchronous transfer mode -- A method to implement a denial of service protection base -- ProtectOS: Operating system and hardware support for small objects -- Practical memory checkers for stacks, queues and deques -- Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields -- A new hash function based on block cipher -- New lower bounds on nonlinearity and a class of highly nonlinear functions -- On the security of self-synchronous ciphers -- Inefficiency of variant characteristics for substitution-permutation networks with position permutations -- Secret sharing with reusable polynomials -- A message authentication code based on latin squares -- Characterization of (k, n) multi-receiver authentication -- Cryptanalysis of adaptive arithmetic coding encryption schemes -- Fast correlation attacks and multiple linear approximations -- Verifiable escrowed signature -- Democratic key escrow scheme -- Design and analyses of two basic protocols for use in TTP-based Key escrow -- Protection of data and delegated keys in digital distribution -- New micropayment schemes based on Pay Words -- On key agreement and conference key agreement -- Identity-based and self-certified key-exchange protocols -- Enabling technology for the trading of MPEG-encoded Video -- Image distribution method with embedded identifier scheme for copyright protection. 330 $aThis book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997. The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1270 606 $aData encryption (Computer science) 606 $aComputer engineering 606 $aManagement information systems 606 $aComputer science 606 $aOperating systems (Computers) 606 $aComputer communication systems 606 $aElectrical engineering 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I27000 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 615 0$aData encryption (Computer science). 615 0$aComputer engineering. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aOperating systems (Computers). 615 0$aComputer communication systems. 615 0$aElectrical engineering. 615 14$aCryptology. 615 24$aComputer Engineering. 615 24$aManagement of Computing and Information Systems. 615 24$aOperating Systems. 615 24$aComputer Communication Networks. 615 24$aCommunications Engineering, Networks. 676 $a005.8 702 $aVaradharajan$b Vijav$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPieprzyk$b Josef$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMu$b Yi$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aACISP '97 906 $aBOOK 912 $a996465754103316 996 $aInformation Security and Privacy$9772014 997 $aUNISA