Information security and privacy : 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings /

Saved in:
Bibliographic Details
Meeting name:ACISP (Conference (8th : 2003 : Wollongong, N.S.W.)
Imprint:Berlin ; New York : Springer, 2003.
Description:xii, 534 p. : ill. ; 24 cm.
Language:English
Series:Lecture notes in computer science ; 2727
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/4899277
Hidden Bibliographic Details
Other authors / contributors:Safavi-Naini, Reihanah.
Seberry, Jennifer, 1944-
ISBN:3540405151 (softcover : alk. paper)
Notes:Includes bibliographical references and index.

MARC

LEADER 00000nam a2200000 a 4500
001 4899277
003 ICU
005 20040409153900.0
008 030612s2003 nyua b 101 0 eng
010 |a  2003054370 
020 |a 3540405151 (softcover : alk. paper) 
040 |a DLC  |c DLC  |d OHX  |d OCoLC  |d OrLoB-B 
042 |a pcc 
049 |a CGUA 
050 0 0 |a QA76.9.A25  |b A279 2003 
072 7 |a QA  |2 lcco 
082 0 0 |a 005.8  |2 21 
111 2 |a ACISP (Conference  |n (8th :  |d 2003 :  |c Wollongong, N.S.W.)  |1 http://viaf.org/viaf/172483825 
245 1 0 |a Information security and privacy :  |b 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings /  |c Rei Safavi-Naini, Jennifer Seberrry (eds.) 
260 |a Berlin ;  |a New York :  |b Springer,  |c 2003. 
300 |a xii, 534 p. :  |b ill. ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
440 0 |a Lecture notes in computer science ;  |v 2727 
504 |a Includes bibliographical references and index. 
505 0 0 |t Grouping Verifiable Content for Selective Disclosure /  |r Laurence Bull, David McG. Squire, Jan Newmarch and Yuliang Zheng --  |t Evaluation of Anonymity of Practical Anonymous Communication Networks /  |r Shigeki Kitazawa, Masakazu Soshi and Atsuko Miyaji --  |t An Anonymous Credential System and a Privacy-Aware PKI /  |r Pino Persiano and Ivan Visconti --  |t Flaws in Some Robust Optimistic Mix-Nets /  |r Masayaki Abe and Hideki Imai --  |t The Unsolvable Privacy Problem and Its Implications for Security Technologies /  |r Andrew Odlyzko --  |t The Security of Fixed versus Random Elliptic Curves in Cryptography /  |r Yvonne Hitchcock, Paul Montague, Gary Carter and Ed Dawson --  |t Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains /  |r Dong-Guk Han, Nam Su Chang, Seak Won Jung, Young-Ho Park, Chang Han Kim and Heuisu Ryu --  |t Generic GF (2[superscript m]) Arithmetic in Software and Its Application to ECC /  |r Andre Weimerskirch, Douglas Stebila and Sheueling Chang Shantz --  |t An Addition Algorithm in Jacobian of C[subscript 34] Curve /  |r Seigo Arita --  |t Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces /  |r Sung-Ming Yen --  |t Differential Fault Analysis on AES Key Schedule and Some Countermeasures /  |r Chien-Ning Chen and Sung-Ming Yen --  |t On the Pseudorandomness of KASUMI Type Permutations /  |r Tetsu Iwata, Tohru Yagi and Kaoru Kurosawa --  |t Theoretical Analysis of X[superscript 2] Attack on RC6 /  |r Masahiko Takenaka, Takeshi Shimoyama and Takeshi Koshiba --  |t A Typed Theory for Access Control and Information Flow Control in Mobile Systems /  |r Libin Wang and Kefei Chen --  |t Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach /  |r Yiu Shing Terry Tin, Colin Boyd and Juan Manuel Gonzalez Nieto --  |t Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications /  |r Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah and Sungwon Sohn --  |t Practical Pay TV Schemes /  |r Arvind Narayanan, C. Pandu Rangan and Kwangjo Kim --  |t Cooperative Routers against DoS Attacks /  |r Ha Yoon Song and Han-gyoo Kim --  |t Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs /  |r Tao Peng, Christopher Leckie and Kotagiri Ramamohanarao --  |t Malicious ICMP Tunneling: Defense against the Vulnerability /  |r Abhishek Singh, Ola Nordstrom, Chenghuai Lu and Andre L. M. dos Santos --  |t On Fair E-cash Systems Based on Group Signature Schemes /  |r Sebastien Canard and Jacques Traore --  |t A Taxonomy of Single Sign-On Systems /  |r Andreas Pashalidis and Chris J. Mitchell --  |t Key Recovery Attacks on the RMAC, TMAC, and IACBC /  |r Jaechul Sung, Deukjo Hong and Sangjin Lee --  |t Key Recovery Attacks on NTRU without Ciphertext Validation Routine /  |r Daewan Han, Jin Hong, Jae Woo Han and Daesung Kwon --  |t Permanent Fault Attack on the Parameters of RSA with CRT /  |r Sung-Ming Yen, SangJae Moon and JaeCheol Ha --  |t Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts /  |r Adam Young and Moti Yung --  |t Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings /  |r Fangguo Zhang and Kwangjo Kim --  |t Digital Signature Schemes with Restriction on Signing Capability /  |r Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee and JongIn Lim --  |t On the Exact Security of Multi-signature Schemes Based on RSA /  |r Kei Kawauchi and Mitsuru Tada --  |t A Length-Flexible Threshold Cryptosystem with Applications /  |r Ivan Damgard and Mads Jurik --  |t Separating Encryption and Key Issuance in Digital Rights Management Systems /  |r Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murata, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba and Hideki Imai --  |t An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers /  |r Yong Ho Hwang, Chong Hee Kim and Pil Joong Lee --  |t Parallel Authentication and Public-Key Encryption /  |r Josef Pieprzyk and David Pointcheval --  |t Is Cross-Platform Security Possible? /  |r Li Gong --  |t A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems /  |r Jason Reid, Ian Cheong, Matthew Henricksen and Jason Smith --  |t Cryptanalysis of a New Cellular Automata Cryptosystem /  |r Feng Bao --  |t A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers /  |r Chik How Tan, Xun Yi and Chee Kheong Siew --  |t Clock-Controlled Shrinking Generator of Feedback Shift Registers /  |r Ali Kanso --  |t EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange /  |r Yong Ho Hwang, Dae Hyun Yum and Pil Joong Lee --  |t Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join /  |r Vanesa Daza, Javier Herranz and German Saez --  |t Robust Software Tokens - Yet Another Method for Securing User's Digital Identity /  |r Taekyoung Kwon --  |t Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders /  |r Hwankoo Kim and SangJae Moon --  |t New Constructions for Resilient and Highly Nonlinear Boolean Functions /  |r Khoongming Khoo and Guang Gong --  |t On Parallel Hash Functions Based on Block-Cipher /  |r Toshihiko Matsuo and Kaoru Kurosawa --  |t Square Hash with a Small Key Size /  |r Swee-Huay Heng and Kaoru Kurosawa. 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458 
650 0 |a Data protection  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102034 
650 0 |a Privacy, Right of  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008110025 
650 7 |a Computer security.  |2 fast  |0 http://id.worldcat.org/fast/fst00872484 
650 7 |a Data protection.  |2 fast  |0 http://id.worldcat.org/fast/fst00887958 
650 7 |a Privacy, Right of.  |2 fast  |0 http://id.worldcat.org/fast/fst01077444 
655 7 |a Conference papers and proceedings.  |2 fast  |0 http://id.worldcat.org/fast/fst01423772 
700 1 |a Safavi-Naini, Reihanah.  |0 http://id.loc.gov/authorities/names/nr95033095  |1 http://viaf.org/viaf/20624517 
700 1 |a Seberry, Jennifer,  |d 1944-  |0 http://id.loc.gov/authorities/names/n79025545  |1 http://viaf.org/viaf/54224429 
901 |a ToCBNA 
903 |a HeVa 
035 |a (OCoLC)52478477 
929 |a cat 
999 f f |i a32ac25e-f51b-57a1-b5d6-43f0c87ffcd1  |s edc54d61-bf18-5db5-ae08-5b6d358ed6ce 
928 |t Library of Congress classification  |a QA76.9.A25A279 2003  |l ASR  |c ASR-SciASR  |i 4577075 
927 |t Library of Congress classification  |a QA76.9.A25A279 2003  |l ASR  |c ASR-SciASR  |e CRERAR  |b 63887976  |i 7475624