HOME > 상세정보

상세정보

Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings

Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings

자료유형
단행본
개인저자
Wang, Huaxiong. Pieprzyk, Josef, 1949-. Varadharajan, Vijay.
서명 / 저자사항
Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings / Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.).
발행사항
Berlin ;   New York :   Springer,   c2004.  
형태사항
xii, 494 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 3108
ISBN
3540223797 (pbk. : alk. paper) 9783540223795 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Data protection -- Congresses. Privacy, Right of -- Congresses.
000 01697camuu2200433 a 4500
001 000045560706
005 20091119165505
008 040607s2004 gw a b 101 0 eng c
010 ▼a 2004108445
016 7 ▼a 971634025 ▼2 GyFmDB
020 ▼a 3540223797 (pbk. : alk. paper)
020 ▼a 9783540223795 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm55963174
035 ▼a (OCoLC)55963174
035 ▼a (KERIS)REF000010870965
040 ▼a OHX ▼c OHX ▼d KKS ▼d CGU ▼d NIC ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA76.9.A25 ▼b A279 2004
072 7 ▼a QA ▼2 lcco
072 7 ▼a Z ▼2 lcco
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 2004
111 2 ▼a ACISP 2004 ▼d (2004 : ▼c Sydney, N.S.W.)
245 1 0 ▼a Information security and privacy : ▼b 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings / ▼c Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.).
246 3 0 ▼a ACISP 2004
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2004.
300 ▼a xii, 494 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3108
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Data protection ▼v Congresses.
650 0 ▼a Privacy, Right of ▼v Congresses.
700 1 ▼a Wang, Huaxiong.
700 1 ▼a Pieprzyk, Josef, ▼d 1949-.
700 1 ▼a Varadharajan, Vijay.
830 0 ▼a Lecture notes in computer science ; ▼v 3108.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A181i 2004 등록번호 121186594 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Broadcast Encryption and Traitor Tracing.- Multi-service Oriented Broadcast Encryption.- Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme.- Linear Code Implies Public-Key Traitor Tracing with Revocation.- TTS without Revocation Capability Secure Against CCA2.- Private Information Retrieval and Oblivious Transfer.- Single Database Private Information Retrieval with Logarithmic Communication.- Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.- Trust and Secret Sharing.- Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing.- NGSCB: A Trusted Open System.- Cryptanalysis (I).- The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers.- Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2.- The Related-Key Rectangle Attack - Application to SHACAL-1.- Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1.- The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders.- Cryptanalysis (II).- Analysis of a Conference Scheme Under Active and Passive Attacks.- Cryptanalysis of Two Password-Authenticated Key Exchange Protocols.- Analysis and Improvement of Micali's Fair Contract Signing Protocol.- Digital Signatures (I).- Digital Signature Schemes with Domain Parameters.- Generic Construction of Certificateless Signature.- Cryptosystems (I).- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model.- How to Re-use Round Function in Super-Pseudorandom Permutation.- How to Remove MAC from DHIES.- Symmetric Key Authentication Services Revisited.- Fast Computation.- Improvements to the Point Halving Algorithm.- Theoretical Analysis of XL over Small Fields.- A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks.- Mobile Agents Security.- A Mobile Agent System Providing Offer Privacy.- Digital Signatures (II).- Identity-Based Strong Designated Verifier Signature Schemes.- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups.- A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups.- Convertible Nominative Signatures.- Protocols.- Protocols with Security Proofs for Mobile Applications.- Secure Bilinear Diffie-Hellman Bits.- Weak Property of Malleability in NTRUSign.- Security Management.- Information Security Risk Assessment, Aggregation, and Mitigation.- Access Control and Authorisation.- A Weighted Graph Approach to Authorization Delegation and Conflict Resolution.- Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.- Cryptosystems (II).- Unconditionally Secure Encryption Under Strong Attacks.- ManTiCore: Encryption with Joint Cipher-State Authentication.- Cryptanalysis (III).- On Security of XTR Public Key Cryptosystems Against Side Channel Attacks.- On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks.- Fault Attacks on Signature Schemes.


정보제공 : Aladin

관련분야 신착자료

Ramamurthy, Bina (2021)
윤관식 (2020)