HOME > Detail View

Detail View

Information security and privacy : 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000 : proceedings

Information security and privacy : 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000 : proceedings

Material type
단행본
Personal Author
Boyd, Colin. Clark, Andrew, 1971-. Dawson, Ed (Edward)
Title Statement
Information security and privacy : 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000 : proceedings / Ed Dawson, Andrew Clark, Colin Boyd (eds.).
Publication, Distribution, etc
New York :   Springer,   c2000.  
Physical Medium
xii, 488 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 1841
ISBN
3540677429 (pbk. : alk. paper) 9783540677420 (pbk. : alk. paper)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Computer security -- Congresses. Data protection -- Congresses. Privacy, Right of -- Congresses.
000 01543camuu2200397 a 4500
001 000045560699
005 20091119171515
008 000608s2000 nyua bi 101 0 eng
010 ▼a 00055630
020 ▼a 3540677429 (pbk. : alk. paper)
020 ▼a 9783540677420 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm44405967
035 ▼a (OCoLC)44405967
035 ▼a (KERIS)REF000012303086
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b A279 2000
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 2000
111 2 ▼a ACISP 2000 ▼d (2000 : ▼c Brisbane, Qld.)
245 1 0 ▼a Information security and privacy : ▼b 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000 : proceedings / ▼c Ed Dawson, Andrew Clark, Colin Boyd (eds.).
246 3 0 ▼a ACISP 2000
260 ▼a New York : ▼b Springer, ▼c c2000.
300 ▼a xii, 488 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1841
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Data protection ▼v Congresses.
650 0 ▼a Privacy, Right of ▼v Congresses.
700 1 ▼a Boyd, Colin.
700 1 ▼a Clark, Andrew, ▼d 1971-.
700 1 ▼a Dawson, Ed ▼q (Edward)
830 0 ▼a Lecture notes in computer science ; ▼v 1841.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 A181i 2000 Accession No. 121186602 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Network Security I.- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System.- Towards a New Authorisation Paradigm for Extranets.- Custom Safety Policies in Safe Erlang.- Public Key Cryptography.- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance.- Network Security II.- High Performance Agile Crypto Modules.- A Three-Party HTTP Proxy to Support Internet Content Regulation.- Cryptographic Implementation Issues.- Cryptanalysis of the m - Permutation Protection Schemes.- An Implementation of Bitsliced DES on the Pentium MMXTM Processor.- Electronic Commerce I.- Securing Large E-Commerce Networks.- Passive Entities: A Strategy for Electronic Payment Design.- Key Recovery.- Key Recovery System for the Commercial Environment.- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication.- Public Key Infrastructure.- Key Management for Secure Multicast with Dynamic Controller.- PKI Seeks a Trusting Relationship.- The PKI Specification Dilemma: A Formal Solution.- Boolean Functions.- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator.- Security Weaknesses in a Randomized Stream Cipher.- Two-Stage Optimisation in the Design of Boolean Functions.- Intrusion Detection.- A Novel Engine for Various Intrusion Detection Methods.- Codes.- Construction and Categories of Codes.- Digital Signatures I.- Cryptanalysis of Polynomial Authentication and Signature Scheme.- Secure Transactions with Mobile Agents in Hostile Environments.- A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability.- Secret Sharing I.- Light Weight Broadcast Exclusion Using Secret Sharing.- Cheating Prevention in Secret Sharing.- On Multiplicative Secret Sharing Schemes.- Digital Signatures II.- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures.- Fail-Stop Confirmer Signatures.- An Extremely Small and Efficient Identification Scheme.- Protocols.- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme.- AKA Protocols for Mobile Communications.- Electronic Commerce II.- A Three Phased Schema for Sealed Bid Auction System Design.- An Online Public Auction Protocol Protecting Bidder Privacy.- Secret Sharing II.- Algorithms to Speed Up Computations in Threshold RSA.- Sharing Block Ciphers.- Keynote Papers.- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce.- Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society.


Information Provided By: : Aladin

New Arrivals Books in Related Fields