HOME > 상세정보

상세정보

Information security and privacy : 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings

Information security and privacy : 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings

자료유형
단행본
개인저자
Safavi-Naini, Reihanah. Seberry, Jennifer, 1944-.
서명 / 저자사항
Information security and privacy : 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings / Rei Safavi-Naini, Jennifer Seberrry (eds.).
발행사항
Berlin ;   New York :   Springer,   c2003.  
형태사항
xii, 534 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 2727
ISBN
3540405151 (pbk. : alk. paper) 9783540405153 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Data protection -- Congresses. Privacy, Right of -- Congresses.
000 01540camuu2200385 a 4500
001 000045560707
005 20091119171915
008 030612s2003 gw a b 101 0 eng
010 ▼a 2003054370
020 ▼a 3540405151 (pbk. : alk. paper)
020 ▼a 9783540405153 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm52478477
035 ▼a (OCoLC)52478477
035 ▼a (KERIS)REF000007371479
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b A279 2003
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 2003
111 2 ▼a ACISP 2003 ▼d (2003 : ▼c Wollongong, N.S.W.)
245 1 0 ▼a Information security and privacy : ▼b 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings / ▼c Rei Safavi-Naini, Jennifer Seberrry (eds.).
246 3 0 ▼a ACISP 2003
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2003.
300 ▼a xii, 534 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2727
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Data protection ▼v Congresses.
650 0 ▼a Privacy, Right of ▼v Congresses.
700 1 ▼a Safavi-Naini, Reihanah.
700 1 ▼a Seberry, Jennifer, ▼d 1944-.
830 0 ▼a Lecture notes in computer science ; ▼v 2727.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A181i 2003 등록번호 121186593 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Privacy and Anonymity.- Grouping Verifiable Content for Selective Disclosure.- Evaluation of Anonymity of Practical Anonymous Communication Networks.- An Anonymous Credential System and a Privacy-Aware PKI.- Flaws in Some Robust Optimistic Mix-Nets.- Invited Talk (I).- The Unsolvable Privacy Problem and Its Implications for Security Technologies.- Elliptic Curves.- The Security of Fixed versus Random Elliptic Curves in Cryptography.- Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains.- Generic GF(2m) Arithmetic in Software and Its Application to ECC.- An Addition Algorithm in Jacobian of C 34 Curve.- Crytpanalysis (I).- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces.- Differential Fault Analysis on AES Key Schedule and Some Countermeasures.- On the Pseudorandomness of KASUMI Type Permutations.- Theoretical Analysis of ?2 Attack on RC6.- Mobile and Network Security.- A Typed Theory for Access Control and Information Flow Control in Mobile Systems.- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications.- Practical Pay TV Schemes.- Cooperative Routers against DoS Attacks.- Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs.- Malicious ICMP Tunneling: Defense against the Vulnerability.- On Fair E-cash Systems Based on Group Signature Schemes.- Invited Talk (II).- A Taxonomy of Single Sign-On Systems.- Cryptanalysis (II).- Key Recovery Attacks on the RMAC, TMAC, and IACBC.- Key Recovery Attacks on NTRU without Ciphertext Validation Routine.- Permanent Fault Attack on the Parameters of RSA with CRT.- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts.- Signature.- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings.- Digital Signature Schemes with Restriction on Signing Capability.- On the Exact Security of Multi-signature Schemes Based on RSA.- Cryptosystems (I).- A Length-Flexible Threshold Cryptosystem with Applications.- Separating Encryption and Key Issuance in Digital Rights Management Systems.- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers.- Parallel Authentication and Public-Key Encryption.- Invited Talk (III).- Is Cross-Platform Security Possible?.- Cryptosystems (II).- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.- Cryptanalysis of a New Cellular Automata Cryptosystem.- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers.- Clock-Controlled Shrinking Generator of Feedback Shift Registers.- Key Management.- EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange.- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join.- Robust Software Tokens - Yet Another Method for Securing User's Digital Identity.- Theory and Hash Functions.- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders.- New Constructions for Resilient and Highly Nonlinear Boolean Functions.- On Parallel Hash Functions Based on Block-Cipher.- Square Hash with a Small Key Size.


정보제공 : Aladin

관련분야 신착자료

Ramamurthy, Bina (2021)
윤관식 (2020)