HOME > 상세정보

상세정보

Cryptography: policy and algorithms : international conference, Brisbane, Queensland, Australia, July 3-5, 1995 : proceedings

Cryptography: policy and algorithms : international conference, Brisbane, Queensland, Australia, July 3-5, 1995 : proceedings

자료유형
단행본
개인저자
Dawson, Ed (Edward) Golic, Jovan.
서명 / 저자사항
Cryptography: policy and algorithms : international conference, Brisbane, Queensland, Australia, July 3-5, 1995 : proceedings / Ed Dawson, Jovan Golic (eds.).
발행사항
Berlin ;   New York :   Springer,   c1996.  
형태사항
xi, 325 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science ;1029
ISBN
3540607595 (pbk. : alk. paper) 9783540607595 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Cryptography -- Congresses.
000 01288camuu2200325 a 4500
001 000045562164
005 20091127173427
008 951211s1996 gw a b 101 0 eng
010 ▼a 95051353
020 ▼a 3540607595 (pbk. : alk. paper)
020 ▼a 9783540607595 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm33971937
035 ▼a (OCoLC)33971937
035 ▼a (KERIS)REF000014737448
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b C844 1996
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b C957
245 0 0 ▼a Cryptography: policy and algorithms : ▼b international conference, Brisbane, Queensland, Australia, July 3-5, 1995 : proceedings / ▼c Ed Dawson, Jovan Golic (eds.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1996.
300 ▼a xi, 325 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science ; ▼v 1029
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Dawson, Ed ▼q (Edward)
700 1 ▼a Golic, Jovan.
830 0 ▼a Lecture notes in computer science ; ▼v 1029.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 C957 등록번호 121186964 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Open forum - Cryptography: Personal freedom and law enforcement is it possible to get agreement?.- Privacy and security policy choices in an NII environment.- Commercial Key Escrow: An Australian perspective.- Encryption and the Global Information Infrastructure: An Australian perspective.- Crypto in Europe - markets, law and policy.- Saving dollars makes sense of crypto export controls.- A proposed architecture for trusted third party services.- A new key escrow cryptosystem.- How to fairly reconstruct a shared secret.- A note on nonuniform decimation of periodic sequences.- Randomness measures related to subset occurrence.- Low order approximation of cipher functions.- Multiple encryption with minimum key.- A one-key cryptosystem based on a finite nonlinear automaton.- A cryptanalysis of clock-controlled shift registers with multiple steps.- Discrete optimisation and fast correlation attacks.- Keyed hash functions.- Some active attacks on fast server-aided secret computation protocols for modular exponentiation.- Cryptanalysis of the enhanced ElGamal's signature scheme.- Access with pseudonyms.- A new identification algorithm.- Public-key cryptography on smart cards.- Integrating smart cards into authentication systems.- Smart-card with interferometric quantum cryptography device.- Cryptographic APIs.- Foiling active network impersonation attacks made in collusion with an insider.- The CASS shell.


정보제공 : Aladin

관련분야 신착자료

Ramamurthy, Bina (2021)
윤관식 (2020)