
Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings
000 | 01481camuu2200373 a 4500 | |
001 | 000045560700 | |
005 | 20091119170745 | |
008 | 980623s1998 gw a b 101 0 eng | |
010 | ▼a 98035424 | |
020 | ▼a 3540647325 (pbk. : alk. paper) | |
020 | ▼a 9783540647324 (pbk. : alk. paper) | |
035 | ▼a (OCoLC)ocm39360628 | |
035 | ▼a (OCoLC)39360628 | |
035 | ▼a (KERIS)REF000004762226 | |
040 | ▼a DLC ▼c DLC ▼d DLC ▼d 211009 | |
050 | 0 0 | ▼a QA76.9.A25 ▼b A279 1998 |
082 | 0 4 | ▼a 005.8 ▼2 22 |
090 | ▼a 005.8 ▼b A181i ▼c 1998 | |
111 | 2 | ▼a ACISP '98 ▼d (1998 : ▼c Brisbane, Qld.) |
245 | 1 0 | ▼a Information security and privacy : ▼b Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings / ▼c Colin Boyd, Ed Dawson, (eds.). |
246 | 3 0 | ▼a ACISP '98 |
260 | ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1998. | |
300 | ▼a xi, 422 p. : ▼b ill. ; ▼c 24 cm. | |
490 | 1 | ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1438 |
504 | ▼a Includes bibliographical references and index. | |
650 | 0 | ▼a Computer security ▼x Congresses. |
650 | 0 | ▼a Data protection ▼x Congresses. |
650 | 0 | ▼a Privacy, Right of ▼x Congresses. |
700 | 1 | ▼a Boyd, Colin. |
700 | 1 | ▼a Dawson, Ed ▼q (Edward) |
830 | 0 | ▼a Lecture notes in computer science ; ▼v 1438. |
945 | ▼a KINS |
Holdings Information
No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
---|---|---|---|---|---|---|---|
No. 1 | Location Science & Engineering Library/Sci-Info(Stacks2)/ | Call Number 005.8 A181i 1998 | Accession No. 121186600 | Availability Available | Due Date | Make a Reservation | Service |
Contents information
Table of Contents
CONTENTS Invited Speakers A Review of the SESAME Development / per Kaijser = 1 The Securiy of Public Key Cryptosystems Based on Integer Factorization / Siguna M$$\ddot u$$ ller ; Winfried B. M$$\ddot a$$ ller = 9 Network Security Ⅰ A Uniform Approach to Securing Unix Applications Using Sesame / Paul Ashley ; Mark Vandenwauver ; Bradley Broom = 24 Integrated Management of Network and Host Based Security Mechanisms / Rainer Falk ; Markus Trommer = 36 Covert Distributed Computing Using Java Through Web Spoofing / Jeffrey Horton ; Jennifer Seberry = 48 Block Ciphers Differential Cryptanalysis of a Block Cipher / Xun Yi ; Kwok Yan Lam ; Yongfei Han = 58 On Private-Key Cryptosystems Based on Product Codes / Hung-Min Sun ; Shiuh-Pyng Shieh = 68 Key Schedules of Iterative Block Ciphers / Gary Carter ; Ed Dawson ; Lauren Nielsen = 80 Network Security Ⅱ Low-Cost Secure Server Connection with Limited-Privilege Clients / Uri Blumenthal ; N. C. Hien ; J. H. Rooney = 90 A Solution to Open Standard of PKI / Qi He, Katia Sycara, Zhongmin Su = 99 Comparison of Commitment Schemes Used in Mix - Mediated Anonymous Communication for Preventing Pool-Mode Attacks / E. Franz ; A. Graubner ; A. Jerichow ; A. Pfitzmann = 111 Stream Ciphers Correlation Attacks on Up / Down Cascades / Jovan Dj. Goli$$c'$$ ; Renato Menicocci = 123 A Stream Cipher Based on Linear Feedback over GF (2^8) / Greg Rose = 135 A Probabilistic Correlation Attack on the Shrinking Generator / L. Simpson ; J. Dj. Goli$$c'$$ ; E. Dawson = 147 Authentication Codes and Boolean Functions Bounds and Constructions for A^3-code with Multi-senders / Rei Safavi-Naini ; Yejing Wang = 159 Rotation-Symmetric Functions and Fast Hashing / Josef Pieprzyk;Cheng Xin Qu = 169 How to Improve the Nonlinearity of Bijective S-Boxes / William Millan = 181 Software Security and Electronic Commerce Object Modeling of Cryptographic Algorithms with UML / Rauli Kaksonen ; Petri M$$\ddot A$$ h$$\ddot o$$ nen = 193 Adapting an Electronic Purse for Internet Payments / Martin Manninger ; Robert Schischka = 205 LITESET : A Light-Weight Secure Electronic Transaction Protocol / Goichiro Hanaoka ; Yuliang Zheng ; Hideki Imai = 215 Public Key Cryptography Applications of Linearised and Sub-linearised Polynomials to Information Security / Marie Henderson = 227 Protocol Failures Related to Order of Encryption and Signature : Computation of Discrete Logarithms in RSA Groups / Mark Chen ; Eric Hughes = 238 Hardware Protetion Against EEPROM Modification Attacks / W. W. Fung ; J. W. Gray, Ⅲ = 250 Trends in Quantum Cryptography in Czech RepubliC / Jaroslav Hruby = 261 Access Control A High Level Language for Conventional Access Control Models / Yun Bai ; Vijay Varadharajan = 273 Fast Access Control Decisions from Delegation Certificate Databases / Tuomas Aura = 284 Meta Objects for Access Control : Role-Based Principals / Thomas Riechmann ; J$$\ddot u$$ rgen Klein$$\ddot o$$ der = 296 A Dynamically Typed Access Control Model / Jonathon E. Tidswell ; John M. Potter = 308 Protocols Efficient Identity-Based Conference Key Distribution Protocols / Shahrokh Saeednia ; Rei Safavi-Naini = 320 A Formal Model for Systematic Design of Key Establishment Protocols / Castern Rudolph = 332 Key Establishment Protocols for Secure Mobile Communication : A Selective Survey / Colin Boyd ; Anish Mathuria = 344 Detecting Key-Dependencies / Tage Stabell-Kulφ ; Arne Helme ; Gianluca Dini = 356 Secret Sharing Secret Sharing in Multilevel and Compartmented Groups / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini = 367 On Construction of Cumulative Secret Sharing Schemes / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini ; Huaxiong Wang = 379 A Comment on the Efficiency of Secret Sharing Scheme over and Finite Abelian Group / Yuo Desmedt ; Brian King ; Wataru Kishimoto ; Kaoru Kurosawa = 391 Disital Signatures A User Identification System Using Signature Written with Mouse / Agus Fanar Syukri ; Eiji Okamoto ; Masahiro Mambo = 403 On Zhang's Nonrepudiable Proxy Signature Schemes / Narn-Yih Lee ; Tzonelih Hwang ; Chih-Hung Wang = 415 Author Index = 423