
Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings
000 | 01617camuu2200385 a 4500 | |
001 | 000000667909 | |
005 | 20091119171938 | |
008 | 990305s1999 gw a b 101 0 eng | |
010 | ▼a 99020761 | |
020 | ▼a 3540657568 (pbk. : alk. paper) | |
020 | ▼a 9783540657569 (pbk. : alk. paper) | |
035 | ▼a (OCoLC)ocm40948458 | |
035 | ▼a (OCoLC)40948458 | |
040 | ▼a DLC ▼c DLC ▼d C#P ▼d OHX ▼d UKM ▼d 211009 | |
042 | ▼a pcc | |
050 | 0 0 | ▼a QA76.9.A25 ▼b A279 1999 |
072 | 7 | ▼a QA ▼2 lcco |
082 | 0 4 | ▼a 005.8 ▼2 22 |
090 | ▼a 005.8 ▼b A181i ▼c 1999 | |
111 | 2 | ▼a ACISP '99 ▼d (1999 : ▼c Wollongong, N.S.W.) |
245 | 1 0 | ▼a Information security and privacy : ▼b 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings / ▼c Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry (eds.). |
260 | ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1999. | |
300 | ▼a xi, 325 p. : ▼b ill. ; ▼c 24 cm. | |
490 | 1 | ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1587 |
504 | ▼a Includes bibliographical references and index. | |
650 | 0 | ▼a Computer security ▼v Congresses. |
650 | 0 | ▼a Data protection ▼v Congresses. |
650 | 0 | ▼a Privacy, Right of ▼v Congresses. |
700 | 1 | ▼a Pieprzyk, Josef, ▼d 1946-. |
700 | 1 | ▼a Safavi-Naini, Reihanah. |
700 | 1 | ▼a Seberry, Jennifer, ▼d 1944-. |
830 | 0 | ▼a Lecture notes in computer science ; ▼v 1587. |
938 | ▼a Otto Harrassowitz ▼b HARR ▼n har000678099 ▼c 78.00 DEM |
Holdings Information
No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
---|---|---|---|---|---|---|---|
No. 1 | Location Main Library/Western Books/ | Call Number 005.8 A181i 1999 | Accession No. 111161011 | Availability Available | Due Date | Make a Reservation | Service |
No. 2 | Location Science & Engineering Library/Sci-Info(Stacks2)/ | Call Number 005.8 A181i 1999 | Accession No. 121186601 | Availability Available | Due Date | Make a Reservation | Service |
No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
---|---|---|---|---|---|---|---|
No. 1 | Location Main Library/Western Books/ | Call Number 005.8 A181i 1999 | Accession No. 111161011 | Availability Available | Due Date | Make a Reservation | Service |
No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
---|---|---|---|---|---|---|---|
No. 1 | Location Science & Engineering Library/Sci-Info(Stacks2)/ | Call Number 005.8 A181i 1999 | Accession No. 121186601 | Availability Available | Due Date | Make a Reservation | Service |
Contents information
Table of Contents
Boolean Functions.- Boolean Function Design Using Hill Climbing Methods.- Enumeration of Correlation Immune Boolean Functions.- On the Symmetric Property of Homogeneous Boolean Functions.- Key Management.- Publicly Verifiable Key Escrow with Limited Time Span.- Accelerating Key Establishment Protocols for Mobile Communication.- Conference Key Agreement from Secret Sharing.- Cryptanalysis.- On m-Permutation Protection Scheme against Modification Attack.- Inversion Attack and Branching.- Signatures.- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature.- Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes.- RSA Cryptosystems.- On the Security of an RSA Based Encryption Scheme.- Generalised Cycling Attacks on RSA and Strong RSA Primes.- RSA Acceleration with Field Programmable Gate Arrays.- Group Cryptography.- Changing Thresholds in the Absence of Secure Channels.- A Self-Certified Group-Oriented Cryptosystem without a Combiner.- Network Security.- Companion Viruses and the Macintosh: Threats and Countermeasures.- An Implementation of a Secure Version of NFS Including RBAC.- Electronic Commerce.- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems.- Effient Electronic Cash Using Batch Signatures.- Evolution of Fair Non-repudiation with TTP.- Access Control.- Authorization in Object Oriented Databases.- An Analysis of Access Control Models.- Odds and Ends.- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems.- Characterization of Optimal Authentication Codes with Arbitration.- A Functional Cryptosystem Using a Group Action.
Information Provided By: :
