HOME > Detail View

Detail View

Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings

Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings

Material type
단행본
Personal Author
Boyd, Colin. Dawson, Ed (Edward)
Title Statement
Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings / Colin Boyd, Ed Dawson, (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c1998.  
Physical Medium
xi, 422 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 1438
ISBN
3540647325 (pbk. : alk. paper) 9783540647324 (pbk. : alk. paper)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Computer security -- Congresses. Data protection -- Congresses. Privacy, Right of -- Congresses.
000 01481camuu2200373 a 4500
001 000045560700
005 20091119170745
008 980623s1998 gw a b 101 0 eng
010 ▼a 98035424
020 ▼a 3540647325 (pbk. : alk. paper)
020 ▼a 9783540647324 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm39360628
035 ▼a (OCoLC)39360628
035 ▼a (KERIS)REF000004762226
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b A279 1998
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 1998
111 2 ▼a ACISP '98 ▼d (1998 : ▼c Brisbane, Qld.)
245 1 0 ▼a Information security and privacy : ▼b Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings / ▼c Colin Boyd, Ed Dawson, (eds.).
246 3 0 ▼a ACISP '98
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1998.
300 ▼a xi, 422 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1438
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼x Congresses.
650 0 ▼a Data protection ▼x Congresses.
650 0 ▼a Privacy, Right of ▼x Congresses.
700 1 ▼a Boyd, Colin.
700 1 ▼a Dawson, Ed ▼q (Edward)
830 0 ▼a Lecture notes in computer science ; ▼v 1438.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 A181i 1998 Accession No. 121186600 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents


CONTENTS

Invited Speakers

 A Review of the SESAME Development / per Kaijser = 1

 The Securiy of Public Key Cryptosystems Based on Integer Factorization / Siguna M$$\ddot u$$ller ; Winfried B. M$$\ddot a$$ller = 9

Network Security Ⅰ

 A Uniform Approach to Securing Unix Applications Using Sesame / Paul Ashley ; Mark Vandenwauver ; Bradley Broom = 24

 Integrated Management of Network and Host Based Security Mechanisms / Rainer Falk ; Markus Trommer = 36

 Covert Distributed Computing Using Java Through Web Spoofing / Jeffrey Horton ; Jennifer Seberry = 48

Block Ciphers

 Differential Cryptanalysis of a Block Cipher / Xun Yi ; Kwok Yan Lam ; Yongfei Han = 58

 On Private-Key Cryptosystems Based on Product Codes / Hung-Min Sun ; Shiuh-Pyng Shieh = 68

 Key Schedules of Iterative Block Ciphers / Gary Carter ; Ed Dawson ; Lauren Nielsen = 80

Network Security Ⅱ

 Low-Cost Secure Server Connection with Limited-Privilege Clients / Uri Blumenthal ; N. C. Hien ; J. H. Rooney = 90

 A Solution to Open Standard of PKI / Qi He, Katia Sycara, Zhongmin Su = 99

 Comparison of Commitment Schemes Used in Mix - Mediated Anonymous Communication for Preventing Pool-Mode Attacks / E. Franz ; A. Graubner ; A. Jerichow ; A. Pfitzmann = 111

Stream Ciphers

 Correlation Attacks on Up / Down Cascades / Jovan Dj. Goli$$c'$$ ; Renato Menicocci = 123

 A Stream Cipher Based on Linear Feedback over GF (2^8) / Greg Rose = 135

 A Probabilistic Correlation Attack on the Shrinking Generator / L. Simpson ; J. Dj. Goli$$c'$$ ; E. Dawson = 147

Authentication Codes and Boolean Functions

 Bounds and Constructions for A^3-code with Multi-senders / Rei Safavi-Naini ; Yejing Wang = 159

 Rotation-Symmetric Functions and Fast Hashing / Josef Pieprzyk;Cheng Xin Qu = 169

 How to Improve the Nonlinearity of Bijective S-Boxes / William Millan = 181

Software Security and Electronic Commerce

 Object Modeling of Cryptographic Algorithms with UML / Rauli Kaksonen ; Petri M$$\ddot A$$h$$\ddot o$$nen = 193

 Adapting an Electronic Purse for Internet Payments / Martin Manninger ; Robert Schischka = 205

 LITESET : A Light-Weight Secure Electronic Transaction Protocol / Goichiro Hanaoka ; Yuliang Zheng ; Hideki Imai = 215

Public Key Cryptography

 Applications of Linearised and Sub-linearised Polynomials to Information Security / Marie Henderson = 227

 Protocol Failures Related to Order of Encryption and Signature : Computation of Discrete Logarithms in RSA Groups / Mark Chen ; Eric Hughes = 238

Hardware

 Protetion Against EEPROM Modification Attacks / W. W. Fung ; J. W. Gray, Ⅲ = 250

 Trends in Quantum Cryptography in Czech RepubliC / Jaroslav Hruby = 261

Access Control

 A High Level Language for Conventional Access Control Models / Yun Bai ; Vijay Varadharajan = 273

 Fast Access Control Decisions from Delegation Certificate Databases / Tuomas Aura = 284

 Meta Objects for Access Control : Role-Based Principals / Thomas Riechmann ; J$$\ddot u$$rgen Klein$$\ddot o$$der = 296

 A Dynamically Typed Access Control Model / Jonathon E. Tidswell ; John M. Potter = 308

Protocols

 Efficient Identity-Based Conference Key Distribution Protocols / Shahrokh Saeednia ; Rei Safavi-Naini = 320

 A Formal Model for Systematic Design of Key Establishment Protocols / Castern Rudolph = 332

 Key Establishment Protocols for Secure Mobile Communication : A Selective Survey / Colin Boyd ; Anish Mathuria = 344

 Detecting Key-Dependencies / Tage Stabell-Kulφ ; Arne Helme ; Gianluca Dini = 356

Secret Sharing

 Secret Sharing in Multilevel and Compartmented Groups / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini = 367

 On Construction of Cumulative Secret Sharing Schemes / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini ; Huaxiong Wang = 379

 A Comment on the Efficiency of Secret Sharing Scheme over and Finite Abelian Group / Yuo Desmedt ; Brian King ; Wataru Kishimoto ; Kaoru Kurosawa = 391

Disital Signatures

 A User Identification System Using Signature Written with Mouse / Agus Fanar Syukri ; Eiji Okamoto ; Masahiro Mambo = 403

 On Zhang's Nonrepudiable Proxy Signature Schemes / Narn-Yih Lee ; Tzonelih Hwang ; Chih-Hung Wang = 415

Author Index = 423



New Arrivals Books in Related Fields