Information Security and Privacy : 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings / / edited by Lynn Batten, Jennifer Seberry |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (XII, 516 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Operating systems (Computers) Computer communication systems Algorithms Computers and civilization Cryptology Management of Computing and Information Systems Operating Systems Computer Communication Networks Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-540-45450-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key Handling -- A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields -- Security Analysis and Improvement of the Global Key Recovery System -- The LILI-II Keystream Generator -- A Secure Re-keying Scheme with Key Recovery Property -- Trust and Secret Sharing -- Modelling Trust Structures for Public Key Infrastructures -- Size of Broadcast in Threshold Schemes with Disenrollment -- Requirements for Group Independent Linear Threshold Secret Sharing Schemes -- Efficient Sharing of Encrypted Data -- Cheating Prevention in Linear Secret Sharing -- Fast Computation -- Note on Fast Computation of Secret RSA Exponents -- Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying -- Cryptanalysis I -- Cryptanalysis of Stream Cipher COS (2, 128) Mode I -- The Analysis of Zheng-Seberry Scheme -- Cryptanalysis of Stream Cipher Alpha1 -- A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem -- Elliptic Curves -- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over -- Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems -- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis -- AES -- Strengthening the Key Schedule of the AES -- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes -- Security Management -- Security Management: An Information Systems Setting -- Resolving Conflicts in Authorization Delegations -- Policy Administration Domains -- Authentication -- Maintaining the Validity of Digital Signatures in B2B Applications -- Short 3-Secure Fingerprinting Codes for Copyright Protection -- An Order-Specified Multisignature Scheme Secure against Active Insider Attacks -- Authenticated Operation of Open Computing Devices -- A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem -- Invited Talk -- A Brief Outline of Research on Correlation Immune Functions -- Oblivious Transfer -- m out of n Oblivious Transfer -- Cryptanalysis II -- On the Security of Reduced Versions of 3-Pass HAVAL -- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling -- On the Security of a Modified Paillier Public-Key Primitive -- Dealing with Adversaries -- How to Play Sherlock Holmes in the World of Mobile Agents -- A Practical Approach Defeating Blackmailing -- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing -- Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. |
Record Nr. | UNINA-9910143899503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Privacy [[electronic resource] ] : First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings / / edited by Josef Pieprzyk, Jennifer Seberry |
Edizione | [1st ed. 1996.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1996 |
Descrizione fisica | 1 online resource (XI, 341 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Computers and civilization Management information systems Computer science Combinatorics Systems and Data Security Cryptology Computer Communication Networks Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-49583-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The changing face of information technology security -- Replicating the Kuperee authentication server for increased security and reliability -- Non-repudiation without public-key -- Investigation of non-repudiation protocols -- A dynamic secret sharing scheme with cheater detection -- A nonlinear secret sharing scheme -- The access structure of some secret-sharing schemes -- On construction of resilient functions -- Another approach to software key escrow encryption -- Cryptography based on transcendental numbers -- Breakthroughs in standardisation of IT security criteria -- Tailoring authentication protocols to match underlying mechanisms -- On the design of security protocols for mobile communications -- A framework for design of key establishment protocols -- On period of multiplexed sequences -- Edit distance correlation attacks on clock-controlled combiners with memory -- A faster cryptanalysis of the self-shrinking generator -- Modeling a multi-level secure object-oriented database using views -- Support for joint action based security policies -- Access control: The neglected frontier -- On the quantitative assessment of behavioural security -- On the modelling of preventive security based on a PC network intrusion experiment -- Evidential reasoning in network intrusion detection systems -- A group-oriented (t, n) undeniable signature scheme without trusted center -- Cryptosystems for hierarchical groups -- On selectable collisionful hash functions -- On password-based authenticated key exchange using collisionful hash functions -- A new universal test for bit strings -- An alternative model of quantum key agreement via photon coupling. |
Record Nr. | UNISA-996465592203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1996 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|