|
|
|
|
LEADER |
00000nam a2200000 a 4500 |
001 |
4899277 |
003 |
ICU |
005 |
20040409153900.0 |
008 |
030612s2003 nyua b 101 0 eng |
010 |
|
|
|a 2003054370
|
020 |
|
|
|a 3540405151 (softcover : alk. paper)
|
040 |
|
|
|a DLC
|c DLC
|d OHX
|d OCoLC
|d OrLoB-B
|
042 |
|
|
|a pcc
|
049 |
|
|
|a CGUA
|
050 |
0 |
0 |
|a QA76.9.A25
|b A279 2003
|
072 |
|
7 |
|a QA
|2 lcco
|
082 |
0 |
0 |
|a 005.8
|2 21
|
111 |
2 |
|
|a ACISP (Conference
|n (8th :
|d 2003 :
|c Wollongong, N.S.W.)
|1 http://viaf.org/viaf/172483825
|
245 |
1 |
0 |
|a Information security and privacy :
|b 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings /
|c Rei Safavi-Naini, Jennifer Seberrry (eds.)
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer,
|c 2003.
|
300 |
|
|
|a xii, 534 p. :
|b ill. ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
440 |
|
0 |
|a Lecture notes in computer science ;
|v 2727
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Grouping Verifiable Content for Selective Disclosure /
|r Laurence Bull, David McG. Squire, Jan Newmarch and Yuliang Zheng --
|t Evaluation of Anonymity of Practical Anonymous Communication Networks /
|r Shigeki Kitazawa, Masakazu Soshi and Atsuko Miyaji --
|t An Anonymous Credential System and a Privacy-Aware PKI /
|r Pino Persiano and Ivan Visconti --
|t Flaws in Some Robust Optimistic Mix-Nets /
|r Masayaki Abe and Hideki Imai --
|t The Unsolvable Privacy Problem and Its Implications for Security Technologies /
|r Andrew Odlyzko --
|t The Security of Fixed versus Random Elliptic Curves in Cryptography /
|r Yvonne Hitchcock, Paul Montague, Gary Carter and Ed Dawson --
|t Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains /
|r Dong-Guk Han, Nam Su Chang, Seak Won Jung, Young-Ho Park, Chang Han Kim and Heuisu Ryu --
|t Generic GF (2[superscript m]) Arithmetic in Software and Its Application to ECC /
|r Andre Weimerskirch, Douglas Stebila and Sheueling Chang Shantz --
|t An Addition Algorithm in Jacobian of C[subscript 34] Curve /
|r Seigo Arita --
|t Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces /
|r Sung-Ming Yen --
|t Differential Fault Analysis on AES Key Schedule and Some Countermeasures /
|r Chien-Ning Chen and Sung-Ming Yen --
|t On the Pseudorandomness of KASUMI Type Permutations /
|r Tetsu Iwata, Tohru Yagi and Kaoru Kurosawa --
|t Theoretical Analysis of X[superscript 2] Attack on RC6 /
|r Masahiko Takenaka, Takeshi Shimoyama and Takeshi Koshiba --
|t A Typed Theory for Access Control and Information Flow Control in Mobile Systems /
|r Libin Wang and Kefei Chen --
|t Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach /
|r Yiu Shing Terry Tin, Colin Boyd and Juan Manuel Gonzalez Nieto --
|t Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications /
|r Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah and Sungwon Sohn --
|t Practical Pay TV Schemes /
|r Arvind Narayanan, C. Pandu Rangan and Kwangjo Kim --
|t Cooperative Routers against DoS Attacks /
|r Ha Yoon Song and Han-gyoo Kim --
|t Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs /
|r Tao Peng, Christopher Leckie and Kotagiri Ramamohanarao --
|t Malicious ICMP Tunneling: Defense against the Vulnerability /
|r Abhishek Singh, Ola Nordstrom, Chenghuai Lu and Andre L. M. dos Santos --
|t On Fair E-cash Systems Based on Group Signature Schemes /
|r Sebastien Canard and Jacques Traore --
|t A Taxonomy of Single Sign-On Systems /
|r Andreas Pashalidis and Chris J. Mitchell --
|t Key Recovery Attacks on the RMAC, TMAC, and IACBC /
|r Jaechul Sung, Deukjo Hong and Sangjin Lee --
|t Key Recovery Attacks on NTRU without Ciphertext Validation Routine /
|r Daewan Han, Jin Hong, Jae Woo Han and Daesung Kwon --
|t Permanent Fault Attack on the Parameters of RSA with CRT /
|r Sung-Ming Yen, SangJae Moon and JaeCheol Ha --
|t Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts /
|r Adam Young and Moti Yung --
|t Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings /
|r Fangguo Zhang and Kwangjo Kim --
|t Digital Signature Schemes with Restriction on Signing Capability /
|r Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee and JongIn Lim --
|t On the Exact Security of Multi-signature Schemes Based on RSA /
|r Kei Kawauchi and Mitsuru Tada --
|t A Length-Flexible Threshold Cryptosystem with Applications /
|r Ivan Damgard and Mads Jurik --
|t Separating Encryption and Key Issuance in Digital Rights Management Systems /
|r Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murata, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba and Hideki Imai --
|t An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers /
|r Yong Ho Hwang, Chong Hee Kim and Pil Joong Lee --
|t Parallel Authentication and Public-Key Encryption /
|r Josef Pieprzyk and David Pointcheval --
|t Is Cross-Platform Security Possible? /
|r Li Gong --
|t A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems /
|r Jason Reid, Ian Cheong, Matthew Henricksen and Jason Smith --
|t Cryptanalysis of a New Cellular Automata Cryptosystem /
|r Feng Bao --
|t A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers /
|r Chik How Tan, Xun Yi and Chee Kheong Siew --
|t Clock-Controlled Shrinking Generator of Feedback Shift Registers /
|r Ali Kanso --
|t EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange /
|r Yong Ho Hwang, Dae Hyun Yum and Pil Joong Lee --
|t Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join /
|r Vanesa Daza, Javier Herranz and German Saez --
|t Robust Software Tokens - Yet Another Method for Securing User's Digital Identity /
|r Taekyoung Kwon --
|t Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders /
|r Hwankoo Kim and SangJae Moon --
|t New Constructions for Resilient and Highly Nonlinear Boolean Functions /
|r Khoongming Khoo and Guang Gong --
|t On Parallel Hash Functions Based on Block-Cipher /
|r Toshihiko Matsuo and Kaoru Kurosawa --
|t Square Hash with a Small Key Size /
|r Swee-Huay Heng and Kaoru Kurosawa.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008101458
|
650 |
|
0 |
|a Data protection
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008102034
|
650 |
|
0 |
|a Privacy, Right of
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008110025
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 http://id.worldcat.org/fast/fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 http://id.worldcat.org/fast/fst00887958
|
650 |
|
7 |
|a Privacy, Right of.
|2 fast
|0 http://id.worldcat.org/fast/fst01077444
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 http://id.worldcat.org/fast/fst01423772
|
700 |
1 |
|
|a Safavi-Naini, Reihanah.
|0 http://id.loc.gov/authorities/names/nr95033095
|1 http://viaf.org/viaf/20624517
|
700 |
1 |
|
|a Seberry, Jennifer,
|d 1944-
|0 http://id.loc.gov/authorities/names/n79025545
|1 http://viaf.org/viaf/54224429
|
901 |
|
|
|a ToCBNA
|
903 |
|
|
|a HeVa
|
035 |
|
|
|a (OCoLC)52478477
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i a32ac25e-f51b-57a1-b5d6-43f0c87ffcd1
|s edc54d61-bf18-5db5-ae08-5b6d358ed6ce
|
928 |
|
|
|t Library of Congress classification
|a QA76.9.A25A279 2003
|l ASR
|c ASR-SciASR
|i 4577075
|
927 |
|
|
|t Library of Congress classification
|a QA76.9.A25A279 2003
|l ASR
|c ASR-SciASR
|e CRERAR
|b 63887976
|i 7475624
|