HOME > 상세정보

상세정보

Information security and privacy : First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings

Information security and privacy : First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings

자료유형
단행본
개인저자
Pieprzyk, Josef, 1949-. Seberry, Jennifer, 1944-.
서명 / 저자사항
Information security and privacy : First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings / Josef Pieprzyk, Jennifer Seberry, eds.
발행사항
Berlin ;   New York :   Springer,   c1996.  
형태사항
ix, 331 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1172
ISBN
3540619917 (pbk. : alk. paper) 9783540619918 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Data protection -- Congresses. Privacy, Right of -- Congresses.
000 01509camuu2200373 a 4500
001 000045560702
005 20091119170730
008 961028s1996 gw a b 101 0 eng
010 ▼a 96048646
020 ▼a 3540619917 (pbk. : alk. paper)
020 ▼a 9783540619918 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm35831358
035 ▼a (OCoLC)35831358
035 ▼a (KERIS)REF000014745834
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b A278 1996
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 1996
111 2 ▼a ACISP '96 ▼d (1996 : ▼c Wollongong, N.S.W.)
245 1 0 ▼a Information security and privacy : ▼b First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings / ▼c Josef Pieprzyk, Jennifer Seberry, eds.
246 3 0 ▼a ACISP '96
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1996.
300 ▼a ix, 331 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1172
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼x Congresses.
650 0 ▼a Data protection ▼x Congresses.
650 0 ▼a Privacy, Right of ▼x Congresses.
700 1 ▼a Pieprzyk, Josef, ▼d 1949-.
700 1 ▼a Seberry, Jennifer, ▼d 1944-.
830 0 ▼a Lecture notes in computer science ; ▼v 1172.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A181i 1996 등록번호 121186598 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차


CONTENTS

Invited Lecture 1 : The Changing Face of Information Technology Security / S. Orlowski = 1

 Session 1 : AUTHENTICATION / Chair : N. Demytko

  Replicating the Kuperee authentication server for increased security and reliability / T. Hardjono ; J. Seberry = 14

  Non-repudiation without public-key / R. Taylor = 27

  Investigation of non-repudiation protocols / Y. Han = 38

 Session 2 : SECRET SHARING / Chair : Y. Zheng

  A dynamic secret sharing scheme with cheater detection / S-J. Hwang ; C-C. Chang = 48

  A nonlinear secret sharing scheme / A. Renvall ; C. Ding = 56

  The acess structure of some secret-scheme / A Renvall and C Ding = 67

 Session 3 : ENCRYPTION AND CRYPTOGRAPHIC FUNCTIONS / Chair : W. Caelli

  On constructin of resilient functions / C-K. Wu ; E. Dawson = 79

  Another approach to software key escrow encryption / E. Dawson ; J. He = 87

  Cryptography based on transcendental numbers / J. Pieprzyk ; H. Ghodosi ; C. Charnes ; R. Safavi-Naini = 96

Invited Lecture 2 : Breakthroughs in Standardisation of IT Security Criteria / E. Troy = 108

 Session 4 : AUTHENTICATION PROTOCOLS / Chair : R. Tylor

  Tailoring authentication protocols to match underlying mechanisms / L. Chen, D. Gollmann ; C. Mitchell = 121

  On the design of security protocols for mobile communications / Y. Mu ; V. Varadharajan = 134

A Framework for Design of Key Establishment Protocols / C. Boyd = 146

 Session 5 : STREAM CHIPHERS / Chair : S. Knapskog

  On period of multiplexed sequences / J. Goli$$c'$$ = 158

  Edit distance correlation attacks on clock - controlled combiners with memory / J. Goli$$c'$$ = 169

  A faster cryptanalysis of the self-shrinking generator / M. Mihaljivi$$c'$$ = 182

 Session 6 : ACCESS CONTROL / Chair : V. Varadharajan

  Modeling a multi-level secure object-oriented database using views / A. Baraani-Dastjerdi ; J. Pieprzyk ; R. Safavi-Naini = 190

  Support for joint action based security policies / V. Varadharajan ; P. Allen = 207

Invited Lecture 3 : Access Control : The Neglected Frontier / R. Sandhu = 219

 Session 7 : SECURITY MODELS AND INTRUSION DETECTION / Chair : R. Safavi-Naini

  On the quantitative assessment of behavioural security / E. Jonsson ; M. Andersson = 228

  On the modelling of preventive security based on a PC network intrusion experiment / U. Gustafson ; E. Jonsson ; T. Olovsson = 242

  Evidential reasoning in network intrusion detection systems / M. Esmaili ; R. Safavi-Naini ; J. Pieprzyk = 253

 Session 8 : THRESHOLD CRYPTOGRAPHY / Chair : E. Dawson

  A group-oriented (t, n) undeniable sihnature scheme without trusted center / C-H. Lin ; C-T. Wang ; C-C. Chang = 266

  Cryptosystems for hierarchical groups / H. Ghodosi ; J. Pieprzyk ; C. Charnes ; R. Safavi-Naini = 275

 Session 9 : HASHING / Chair : J. Goli$$c'$$

 On selectable collisionful hash functions / S. Bakhtiari ; R. Safavi-Naini ; J. Pieprzyk = 287

  On password-based authenticated key exchange using collisionful hash functions / S. Bakhtiari ; R. Safavi-Naini ; J. Pieprzyk = 299

 Session 10 : ODDS AND ENDS / Chair : L. Brown

  A new universal test for bit strings / B. Sadeghiyan ; J. Mohajeri = 311

  An alternative model of quantum key agreement via photon coupling / Y. Mu ; Y. Zheng = 320

Author Index = 333



관련분야 신착자료