top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security and Privacy : 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings / / edited by Lynn Batten, Jennifer Seberry
Information Security and Privacy : 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings / / edited by Lynn Batten, Jennifer Seberry
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XII, 516 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Operating systems (Computers)
Computer communication systems
Algorithms
Computers and civilization
Cryptology
Management of Computing and Information Systems
Operating Systems
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-540-45450-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key Handling -- A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields -- Security Analysis and Improvement of the Global Key Recovery System -- The LILI-II Keystream Generator -- A Secure Re-keying Scheme with Key Recovery Property -- Trust and Secret Sharing -- Modelling Trust Structures for Public Key Infrastructures -- Size of Broadcast in Threshold Schemes with Disenrollment -- Requirements for Group Independent Linear Threshold Secret Sharing Schemes -- Efficient Sharing of Encrypted Data -- Cheating Prevention in Linear Secret Sharing -- Fast Computation -- Note on Fast Computation of Secret RSA Exponents -- Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying -- Cryptanalysis I -- Cryptanalysis of Stream Cipher COS (2, 128) Mode I -- The Analysis of Zheng-Seberry Scheme -- Cryptanalysis of Stream Cipher Alpha1 -- A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem -- Elliptic Curves -- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over -- Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems -- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis -- AES -- Strengthening the Key Schedule of the AES -- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes -- Security Management -- Security Management: An Information Systems Setting -- Resolving Conflicts in Authorization Delegations -- Policy Administration Domains -- Authentication -- Maintaining the Validity of Digital Signatures in B2B Applications -- Short 3-Secure Fingerprinting Codes for Copyright Protection -- An Order-Specified Multisignature Scheme Secure against Active Insider Attacks -- Authenticated Operation of Open Computing Devices -- A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem -- Invited Talk -- A Brief Outline of Research on Correlation Immune Functions -- Oblivious Transfer -- m out of n Oblivious Transfer -- Cryptanalysis II -- On the Security of Reduced Versions of 3-Pass HAVAL -- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling -- On the Security of a Modified Paillier Public-Key Primitive -- Dealing with Adversaries -- How to Play Sherlock Holmes in the World of Mobile Agents -- A Practical Approach Defeating Blackmailing -- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing -- Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.
Record Nr. UNINA-9910143899503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings / / edited by Josef Pieprzyk, Jennifer Seberry
Information Security and Privacy [[electronic resource] ] : First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings / / edited by Josef Pieprzyk, Jennifer Seberry
Edizione [1st ed. 1996.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1996
Descrizione fisica 1 online resource (XI, 341 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Computers and civilization
Management information systems
Computer science
Combinatorics
Systems and Data Security
Cryptology
Computer Communication Networks
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-49583-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The changing face of information technology security -- Replicating the Kuperee authentication server for increased security and reliability -- Non-repudiation without public-key -- Investigation of non-repudiation protocols -- A dynamic secret sharing scheme with cheater detection -- A nonlinear secret sharing scheme -- The access structure of some secret-sharing schemes -- On construction of resilient functions -- Another approach to software key escrow encryption -- Cryptography based on transcendental numbers -- Breakthroughs in standardisation of IT security criteria -- Tailoring authentication protocols to match underlying mechanisms -- On the design of security protocols for mobile communications -- A framework for design of key establishment protocols -- On period of multiplexed sequences -- Edit distance correlation attacks on clock-controlled combiners with memory -- A faster cryptanalysis of the self-shrinking generator -- Modeling a multi-level secure object-oriented database using views -- Support for joint action based security policies -- Access control: The neglected frontier -- On the quantitative assessment of behavioural security -- On the modelling of preventive security based on a PC network intrusion experiment -- Evidential reasoning in network intrusion detection systems -- A group-oriented (t, n) undeniable signature scheme without trusted center -- Cryptosystems for hierarchical groups -- On selectable collisionful hash functions -- On password-based authenticated key exchange using collisionful hash functions -- A new universal test for bit strings -- An alternative model of quantum key agreement via photon coupling.
Record Nr. UNISA-996465592203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1996
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui