
Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings
000 | 01481camuu2200385 a 4500 | |
001 | 000045560704 | |
005 | 20091119165358 | |
008 | 070525s2007 gw a b 101 0 eng d | |
010 | ▼a 2007929635 | |
020 | ▼a 9783540734574 (pbk.) | |
020 | ▼a 3540734570 (pbk.) | |
035 | ▼a (OCoLC)ocm145453814 | |
035 | ▼a (OCoLC)145453814 | |
035 | ▼a (KERIS)REF000013555505 | |
040 | ▼a OHX ▼c OHX ▼d CUS ▼d DLC ▼d 211009 | |
042 | ▼a lccopycat | |
050 | 0 0 | ▼a QA76.9.A25 ▼b A279 2007 |
072 | 7 | ▼a QA ▼2 lcco |
082 | 0 4 | ▼a 005.8 ▼2 22 |
090 | ▼a 005.8 ▼b A181i ▼c 2007 | |
111 | 2 | ▼a ACISP 2007 ▼d (2007 : ▼c Townsville, Qld.) |
245 | 1 0 | ▼a Information security and privacy : ▼b 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings / ▼c Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.). |
246 | 3 0 | ▼a ACISP 2007 |
260 | ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2007. | |
300 | ▼a xiv, 476 p. : ▼b ill. ; ▼c 24 cm. | |
490 | 1 | ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 4586 |
504 | ▼a Includes bibliographical references and index. | |
650 | 0 | ▼a Computer security ▼v Congresses. |
700 | 1 | ▼a Pieprzyk, Josef, ▼d 1949-. |
700 | 1 | ▼a Ghodosi, Hossein. |
700 | 1 | ▼a Dawson, Ed ▼q (Edward) |
830 | 0 | ▼a Lecture notes in computer science ; ▼v 4586. |
945 | ▼a KINS |
소장정보
No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
---|---|---|---|---|---|---|---|
No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 A181i 2007 | 등록번호 121186596 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
목차
Stream Ciphers.- An Analysis of the Hermes8 Stream Ciphers.- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.- Strengthening NLS Against Crossword Puzzle Attack.- Hashing.- A New Strategy for Finding a Differential Path of SHA-1.- Preimage Attack on the Parallel FFT-Hashing Function.- Second Preimages for Iterated Hash Functions and Their Implications on MACs.- On Building Hash Functions from Multivariate Quadratic Equations.- Biometrics.- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.- Soft Generation of Secure Biometric Keys.- Secret Sharing.- Flaws in Some Secret Sharing Schemes Against Cheating.- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters.- Cryptanalysis.- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.- Analysis of the SMS4 Block Cipher.- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.- Public Key Cryptography.- : A Hardware-Oriented Trapdoor Cipher.- Anonymity on Paillier's Trap-Door Permutation.- Generic Certificateless Key Encapsulation Mechanism.- Double-Size Bipartite Modular Multiplication.- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.- Authentication.- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.- Certificateless Signature Revisited.- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.- Hash-and-Sign with Weak Hashing Made Secure.- "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing.- Threshold Anonymous Group Identification and Zero-Knowledge Proof.- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.- E-Commerce.- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.- Efficient and Secure Comparison for On-Line Auctions.- Practical Compact E-Cash.- Security.- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.- On Proactive Perfectly Secure Message Transmission.
정보제공 :
