Information security and privacy : 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5-7, 2010 ; proceedings /

Saved in:
Bibliographic Details
Meeting name:ACISP (Conference) (15th : 2010 : Sydney, N.S.W.)
Imprint:Berlin : Springer, 2010.
Description:1 online resource (xii, 402 pages) : illustrations.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 6168
Lecture notes in computer science ; 6168.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11074965
Hidden Bibliographic Details
ISBN:9783642140815
3642140815
9783642140808
3642140807
Notes:Includes bibliographical references.
Print version record.
Summary:Annotation This book constitutes the refereed proceedings of the 15th Australasian Conference on Information Security and Privacy, ACISP 2010, held in Sydney, Australia, in July 2010. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric key encryption; hash functions; public key cryptography; protocols; and network security.
Other form:Print version: Information security and privacy. Berlin : Springer, 2010 9783642140808

MARC

LEADER 00000cam a2200000Ka 4500
001 11074965
005 20170630045700.7
006 m o d
007 cr cn|||||||||
008 101101s2010 gw a ob 100 0 eng d
003 ICU
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d CEF  |d OCLCQ  |d OCLCA  |d CUS  |d E7B  |d OUN  |d COO  |d LEAUB  |d OCLCQ  |d OCLCF  |d BEDGE  |d OCLCQ  |d OCLCO  |d YDXCP  |d NUI  |d OCL  |d OCLCO  |d EBLCP  |d OCLCQ  |d SOI 
019 |a 667361922  |a 769767764 
020 |a 9783642140815 
020 |a 3642140815 
020 |z 9783642140808  |q (pbk.) 
020 |z 3642140807  |q (pbk.) 
035 |a (OCoLC)676700468  |z (OCoLC)667361922  |z (OCoLC)769767764 
037 |a 978-3-642-14080-8  |b Springer  |n http://www.springerlink.com 
050 4 |a QA76.9 
072 7 |a QA  |2 lcco 
049 |a MAIN 
111 2 |a ACISP (Conference)  |n (15th :  |d 2010 :  |c Sydney, N.S.W.)  |0 http://id.loc.gov/authorities/names/nb2010017835  |1 http://viaf.org/viaf/312856949 
245 1 0 |a Information security and privacy :  |b 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5-7, 2010 ; proceedings /  |c Ron Steinfeld, Philip Hawkes (eds.). 
260 |a Berlin :  |b Springer,  |c 2010. 
300 |a 1 online resource (xii, 402 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 6168 
504 |a Includes bibliographical references. 
588 0 |a Print version record. 
520 8 |a Annotation  |b This book constitutes the refereed proceedings of the 15th Australasian Conference on Information Security and Privacy, ACISP 2010, held in Sydney, Australia, in July 2010. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric key encryption; hash functions; public key cryptography; protocols; and network security. 
505 0 |a Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. 
650 0 |a Data protection  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102034 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458 
650 0 |a Computer networks  |x Access control  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007008426 
650 7 |a Informatique.  |2 eclas 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 0 7 |a Datensicherung.  |2 swd 
650 0 7 |a Computersicherheit.  |2 swd 
650 0 7 |a Privatsphäre.  |2 swd 
650 0 7 |a Kryptoanalyse.  |2 swd 
650 0 7 |a Kryptosystem.  |2 swd 
650 0 7 |a Hash-Algorithmus.  |2 swd 
650 0 7 |a Sicherheitsprotokoll.  |2 swd 
651 7 |a Sydney <2010>  |2 swd 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
776 0 8 |i Print version:  |t Information security and privacy.  |d Berlin : Springer, 2010  |z 9783642140808  |w (OCoLC)646006883 
830 0 |a Lecture notes in computer science ;  |v 6168. 
856 4 0 |u http://link.springer.com/10.1007/978-3-642-14081-5  |y SpringerLink 
903 |a HeVa 
929 |a eresource 
999 f f |i 80a4f4ec-4170-5d0d-8beb-ae070b68336b  |s 548c19ae-f200-5a35-85bc-32a422a08154 
928 |t Library of Congress classification  |a QA76.9  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-642-14081-5  |z SpringerLink  |g ebooks  |i 9884470