HOME > 상세정보

상세정보

Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings

Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings

자료유형
단행본
개인저자
Pieprzyk, Josef, 1946-. Safavi-Naini, Reihanah. Seberry, Jennifer, 1944-.
서명 / 저자사항
Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings / Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry (eds.).
발행사항
Berlin ;   New York :   Springer,   c1999.  
형태사항
xi, 325 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1587
ISBN
3540657568 (pbk. : alk. paper) 9783540657569 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Data protection -- Congresses. Privacy, Right of -- Congresses.
000 01617camuu2200385 a 4500
001 000000667909
005 20091119171938
008 990305s1999 gw a b 101 0 eng
010 ▼a 99020761
020 ▼a 3540657568 (pbk. : alk. paper)
020 ▼a 9783540657569 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm40948458
035 ▼a (OCoLC)40948458
040 ▼a DLC ▼c DLC ▼d C#P ▼d OHX ▼d UKM ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b A279 1999
072 7 ▼a QA ▼2 lcco
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 1999
111 2 ▼a ACISP '99 ▼d (1999 : ▼c Wollongong, N.S.W.)
245 1 0 ▼a Information security and privacy : ▼b 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings / ▼c Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry (eds.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1999.
300 ▼a xi, 325 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1587
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Data protection ▼v Congresses.
650 0 ▼a Privacy, Right of ▼v Congresses.
700 1 ▼a Pieprzyk, Josef, ▼d 1946-.
700 1 ▼a Safavi-Naini, Reihanah.
700 1 ▼a Seberry, Jennifer, ▼d 1944-.
830 0 ▼a Lecture notes in computer science ; ▼v 1587.
938 ▼a Otto Harrassowitz ▼b HARR ▼n har000678099 ▼c 78.00 DEM

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.8 A181i 1999 등록번호 111161011 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A181i 1999 등록번호 121186601 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.8 A181i 1999 등록번호 111161011 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A181i 1999 등록번호 121186601 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Boolean Functions.- Boolean Function Design Using Hill Climbing Methods.- Enumeration of Correlation Immune Boolean Functions.- On the Symmetric Property of Homogeneous Boolean Functions.- Key Management.- Publicly Verifiable Key Escrow with Limited Time Span.- Accelerating Key Establishment Protocols for Mobile Communication.- Conference Key Agreement from Secret Sharing.- Cryptanalysis.- On m-Permutation Protection Scheme against Modification Attack.- Inversion Attack and Branching.- Signatures.- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature.- Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes.- RSA Cryptosystems.- On the Security of an RSA Based Encryption Scheme.- Generalised Cycling Attacks on RSA and Strong RSA Primes.- RSA Acceleration with Field Programmable Gate Arrays.- Group Cryptography.- Changing Thresholds in the Absence of Secure Channels.- A Self-Certified Group-Oriented Cryptosystem without a Combiner.- Network Security.- Companion Viruses and the Macintosh: Threats and Countermeasures.- An Implementation of a Secure Version of NFS Including RBAC.- Electronic Commerce.- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems.- Effient Electronic Cash Using Batch Signatures.- Evolution of Fair Non-repudiation with TTP.- Access Control.- Authorization in Object Oriented Databases.- An Analysis of Access Control Models.- Odds and Ends.- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems.- Characterization of Optimal Authentication Codes with Arbitration.- A Functional Cryptosystem Using a Group Action.


정보제공 : Aladin

관련분야 신착자료

Ramamurthy, Bina (2021)
윤관식 (2020)