HOME > Detail View

Detail View

Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings

Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings

Material type
단행본
Personal Author
Pieprzyk, Josef, 1949-. Ghodosi, Hossein. Dawson, Ed (Edward)
Title Statement
Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings / Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2007.  
Physical Medium
xiv, 476 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 4586
ISBN
9783540734574 (pbk.) 3540734570 (pbk.)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Computer security -- Congresses.
000 01481camuu2200385 a 4500
001 000045560704
005 20091119165358
008 070525s2007 gw a b 101 0 eng d
010 ▼a 2007929635
020 ▼a 9783540734574 (pbk.)
020 ▼a 3540734570 (pbk.)
035 ▼a (OCoLC)ocm145453814
035 ▼a (OCoLC)145453814
035 ▼a (KERIS)REF000013555505
040 ▼a OHX ▼c OHX ▼d CUS ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA76.9.A25 ▼b A279 2007
072 7 ▼a QA ▼2 lcco
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 2007
111 2 ▼a ACISP 2007 ▼d (2007 : ▼c Townsville, Qld.)
245 1 0 ▼a Information security and privacy : ▼b 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings / ▼c Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.).
246 3 0 ▼a ACISP 2007
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2007.
300 ▼a xiv, 476 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 4586
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
700 1 ▼a Pieprzyk, Josef, ▼d 1949-.
700 1 ▼a Ghodosi, Hossein.
700 1 ▼a Dawson, Ed ▼q (Edward)
830 0 ▼a Lecture notes in computer science ; ▼v 4586.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 A181i 2007 Accession No. 121186596 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Stream Ciphers.- An Analysis of the Hermes8 Stream Ciphers.- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.- Strengthening NLS Against Crossword Puzzle Attack.- Hashing.- A New Strategy for Finding a Differential Path of SHA-1.- Preimage Attack on the Parallel FFT-Hashing Function.- Second Preimages for Iterated Hash Functions and Their Implications on MACs.- On Building Hash Functions from Multivariate Quadratic Equations.- Biometrics.- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.- Soft Generation of Secure Biometric Keys.- Secret Sharing.- Flaws in Some Secret Sharing Schemes Against Cheating.- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters.- Cryptanalysis.- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.- Analysis of the SMS4 Block Cipher.- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.- Public Key Cryptography.- : A Hardware-Oriented Trapdoor Cipher.- Anonymity on Paillier's Trap-Door Permutation.- Generic Certificateless Key Encapsulation Mechanism.- Double-Size Bipartite Modular Multiplication.- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.- Authentication.- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.- Certificateless Signature Revisited.- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.- Hash-and-Sign with Weak Hashing Made Secure.- "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing.- Threshold Anonymous Group Identification and Zero-Knowledge Proof.- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.- E-Commerce.- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.- Efficient and Secure Comparison for On-Line Auctions.- Practical Compact E-Cash.- Security.- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.- On Proactive Perfectly Secure Message Transmission.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Ramamurthy, Bina (2021)
윤관식 (2020)