HOME > Detail View

Detail View

Information security and privacy : 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings

Information security and privacy : 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings

Material type
단행본
Personal Author
Mu, Yi , 1955- Susilo, Willy. Seberry, Jennifer , 1944-
Title Statement
Information security and privacy : 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings / Yi Mu, Willy Susilo, Jennifer Seberry (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer ,   c2008.  
Physical Medium
xiii, 480 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science ,0302-9743 ; 5107
ISBN
9783540699712 (pbk. : alk. paper) 3540699716 (pbk. : alk. paper)
Bibliography, Etc. Note
Includes bibliographical references and author index.
Subject Added Entry-Topical Term
Computers -- Access control -- Congresses. Computer security -- Congresses. Data protection -- Congresses.
000 01705camuu2200433 a 4500
001 000045561074
005 20091123145935
008 091123s2008 gw a b 101 0 eng d
010 ▼a 2008930081
016 7 ▼a 989061620 ▼2 GyFmDB
020 ▼a 9783540699712 (pbk. : alk. paper)
020 ▼a 3540699716 (pbk. : alk. paper)
029 0 ▼a OHX ▼b har080100969
035 ▼a (OCoLC)ocm233544543
035 ▼a (OCoLC)233544543
035 ▼a (NNC)6800252
040 ▼a OHX ▼c OHX ▼d BTCTA ▼d LUU ▼d 211009
050 1 4 ▼a QA76.9.A25 ▼b A279 2008
072 7 ▼a QA ▼2 lcco
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 2008
111 2 ▼a ACISP 2008 ▼d (2008 : ▼c Wollongong, N.S.W.)
245 1 0 ▼a Information security and privacy : ▼b 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings / ▼c Yi Mu, Willy Susilo, Jennifer Seberry (eds.).
246 3 0 ▼a ACISP 2008
260 ▼a Berlin ; ▼a New York : ▼b Springer , ▼c c2008.
300 ▼a xiii, 480 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science , ▼x 0302-9743 ; ▼v 5107
490 1 ▼a LNCS sublibrary. SL 4, Security and cryptology
504 ▼a Includes bibliographical references and author index.
650 0 ▼a Computers ▼x Access control ▼v Congresses.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Data protection ▼v Congresses.
700 1 ▼a Mu, Yi , ▼d 1955-
700 1 ▼a Susilo, Willy.
700 1 ▼a Seberry, Jennifer , ▼d 1944-
830 0 ▼a Lecture notes in computer science ; ▼v 5107.
830 0 ▼a LNCS sublibrary. ▼n SL 4, ▼p Security and cryptology.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 A181i 2008 Accession No. 121186472 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

New Paradigms for Password Security.- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.- Secure Biometric Authentication with Improved Accuracy.- A Critical Analysis and Improvement of AACS Drive-Host Authentication.- Comparing the Pre- and Post-specified Peer Models for Key Agreement.- Efficient One-Round Key Exchange in the Standard Model.- On the Improvement of the BDF Attack on LSBS-RSA.- Public-Key Cryptosystems with Primitive Power Roots of Unity.- Relationship between Two Approaches for Defining the Standard Model PA-ness.- Distributed Verification of Mixing - Local Forking Proofs Model.- Fully-Simulatable Oblivious Set Transfer.- Efficient Disjointness Tests for Private Datasets.- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.- Multidimensional Linear Cryptanalysis of Reduced Round Serpent.- Cryptanalysis of Reduced-Round SMS4 Block Cipher.- On the Unprovable Security of 2-Key XCBC.- Looking Back at a New Hash Function.- Non-linear Reduced Round Attacks against SHA-2 Hash Family.- Collisions for Round-Reduced LAKE.- Preimage Attacks on Step-Reduced MD5.- Linear Distinguishing Attack on Shannon.- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck.- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128.- Signature Generation and Detection of Malware Families.- Reducing Payload Scans for Attack Signature Matching Using Rule Classification.- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor.- FormatShield: A Binary Rewriting Defense against Format String Attacks.- Advanced Permission-Role Relationship in Role-Based Access Control.- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases.- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ).- A Tree-Based Approach for Computing Double-Base Chains.- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves.- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Ramamurthy, Bina (2021)
윤관식 (2020)