HOME > Detail View

Detail View

Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings

Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings

Material type
Personal Author
Boyd, Colin, 1959-. Gonzalez Nieto, Juan M.
Title Statement
Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings / Colin Boyd, Juan M. Gonzalez Nieto (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2005.  
Physical Medium
xiii, 586 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 3574
3540265473 (pbk. : alk. paper) 9783540265474 (pbk. : alk. paper)
General Note
Also issued online.
Bibliography, Etc. Note
Includes bibliographical references and author index.
이용가능한 다른형태자료
Also issued online.  
Subject Added Entry-Topical Term
Computer security -- Congresses.
000 01688camuu2200397 a 4500
001 000045560705
005 20091119165214
008 050601s2005 gw a b 101 0 eng d
010 ▼a 2005928379
016 7 ▼a 975230719 ▼2 GyFmDB
020 ▼a 3540265473 (pbk. : alk. paper)
020 ▼a 9783540265474 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm60800905
035 ▼a (OCoLC)60800905
035 ▼a (KERIS)REF000012508488
040 ▼a OHX ▼c OHX ▼d CUS ▼d C$Q ▼d BAKER ▼d IQU ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA76.9.A25 ▼b A279 2005
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 2005
111 2 ▼a ACISP 2005 ▼d (2005 : ▼c Brisbane, Qld.)
245 1 0 ▼a Information security and privacy : ▼b 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings / ▼c Colin Boyd, Juan M. Gonzalez Nieto (eds.).
246 3 0 ▼a ACISP 2005
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xiii, 586 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3574
504 ▼a Includes bibliographical references and author index.
530 ▼a Also issued online.
650 0 ▼a Computer security ▼v Congresses.
700 1 ▼a Boyd, Colin, ▼d 1959-.
700 1 ▼a Gonzalez Nieto, Juan M.
830 0 ▼a Lecture notes in computer science ; ▼v 3574.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 A181i 2005 Accession No. 121186595 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Invited Talk.- All Sail, No Anchor III: Risk Aggregation and Time's Arrow.- Network Security.- Traversing Middleboxes with the Host Identity Protocol.- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia.- An Efficient Solution to the ARP Cache Poisoning Problem.- Cryptanalysis.- On Stern's Attack Against Secret Truncated Linear Congruential Generators.- On the Success Probability of ? 2-attack on RC6.- Solving Systems of Differential Equations of Addition.- Group Communications.- A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead.- Dynamic Group Key Agreement in Tree-Based Setting.- Immediate Data Authentication for Multicast in Resource Constrained Network.- Elliptic Curve Cryptography.- Redundant Trinomials for Finite Fields of Characteristic 2.- Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields.- A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two.- Mobile Security.- Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents.- An Improved Execution Integrity Solution for Mobile Agents.- RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.- Side Channel Attacks.- Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards.- Improved Zero Value Attack on XTR.- Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks.- Evaluation and Biometrics.- SIFA: A Tool for Evaluation of High-Grade Security Devices.- Cancelable Key-Based Fingerprint Templates.- Public Key Cryptosystems.- Hybrid Signcryption Schemes with Insider Security.- On the Possibility of Constructing Meaningful Hash Collisions for Public Keys.- Tunable Balancing of RSA.- Access Control I.- Key Management for Role Hierarchy in Distributed Systems.- A Formalization of Distributed Authorization with Delegation.- Signatures I.- Two Improved Partially Blind Signature Schemes from Bilinear Pairings.- On the Security of Nominative Signatures.- Invited Talk.- Who Goes There? Internet Banking: A Matter of Risk and Reward.- Access Control II.- Role Activation Management in Role Based Access Control.- VO-Sec: An Access Control Framework for Dynamic Virtual Organization.- Threshold Cryptography.- An Efficient Implementation of a Threshold RSA Signature Scheme.- GBD Threshold Cryptography with an Application to RSA Key Recovery.- An (n-t)-out-of-n Threshold Ring Signature Scheme.- Protocols I.- Deposit-Case Attack Against Secure Roaming.- Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.- Group Signatures.- Group Signature Schemes with Membership Revocation for Large Groups.- An Efficient Group Signature Scheme from Bilinear Maps.- Group Signature Where Group Manager, Members and Open Authority Are Identity-Based.- Protocols II.- Analysis of the HIP Base Exchange Protocol.- ID-based Authenticated Key Agreement for Low-Power Mobile Devices.- Signatures II.- On the Security of Two Key-Updating Signature Schemes.- Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS.- Invited Talk.- Potential Impacts of a Growing Gap Between Theory and Practice in Information Security.- Credentials.- Security Analysis and Fix of an Anonymous Credential System.- Counting Abuses Using Flexible Off-line Credentials.- Symmetric Cryptography.- Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity.- New Cryptographic Applications of Boolean Function Equivalence Classes.

Information Provided By: : Aladin

New Arrivals Books in Related Fields

한국정보기술연구원 (2022)
한국정보기술연구원 (2021)
Lerner, Reuven (2021)
천인국 (2022)