Information security and privacy : 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings /

Saved in:
Bibliographic Details
Meeting name:ACISP (Conference (8th : 2003 : Wollongong, N.S.W.)
Imprint:Berlin ; New York : Springer, 2003.
Description:xii, 534 p. : ill. ; 24 cm.
Language:English
Series:Lecture notes in computer science ; 2727
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/4899277
Hidden Bibliographic Details
Other authors / contributors:Safavi-Naini, Reihanah.
Seberry, Jennifer, 1944-
ISBN:3540405151 (softcover : alk. paper)
Notes:Includes bibliographical references and index.
Table of Contents:
  • Grouping Verifiable Content for Selective Disclosure / Laurence Bull, David McG. Squire, Jan Newmarch and Yuliang Zheng
  • Evaluation of Anonymity of Practical Anonymous Communication Networks / Shigeki Kitazawa, Masakazu Soshi and Atsuko Miyaji
  • An Anonymous Credential System and a Privacy-Aware PKI / Pino Persiano and Ivan Visconti
  • Flaws in Some Robust Optimistic Mix-Nets / Masayaki Abe and Hideki Imai
  • The Unsolvable Privacy Problem and Its Implications for Security Technologies / Andrew Odlyzko
  • The Security of Fixed versus Random Elliptic Curves in Cryptography / Yvonne Hitchcock, Paul Montague, Gary Carter and Ed Dawson
  • Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains / Dong-Guk Han, Nam Su Chang, Seak Won Jung, Young-Ho Park, Chang Han Kim and Heuisu Ryu
  • Generic GF (2[superscript m]) Arithmetic in Software and Its Application to ECC / Andre Weimerskirch, Douglas Stebila and Sheueling Chang Shantz
  • An Addition Algorithm in Jacobian of C[subscript 34] Curve / Seigo Arita
  • Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces / Sung-Ming Yen
  • Differential Fault Analysis on AES Key Schedule and Some Countermeasures / Chien-Ning Chen and Sung-Ming Yen
  • On the Pseudorandomness of KASUMI Type Permutations / Tetsu Iwata, Tohru Yagi and Kaoru Kurosawa
  • Theoretical Analysis of X[superscript 2] Attack on RC6 / Masahiko Takenaka, Takeshi Shimoyama and Takeshi Koshiba
  • A Typed Theory for Access Control and Information Flow Control in Mobile Systems / Libin Wang and Kefei Chen
  • Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach / Yiu Shing Terry Tin, Colin Boyd and Juan Manuel Gonzalez Nieto
  • Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications / Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah and Sungwon Sohn
  • Practical Pay TV Schemes / Arvind Narayanan, C. Pandu Rangan and Kwangjo Kim
  • Cooperative Routers against DoS Attacks / Ha Yoon Song and Han-gyoo Kim
  • Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs / Tao Peng, Christopher Leckie and Kotagiri Ramamohanarao
  • Malicious ICMP Tunneling: Defense against the Vulnerability / Abhishek Singh, Ola Nordstrom, Chenghuai Lu and Andre L. M. dos Santos
  • On Fair E-cash Systems Based on Group Signature Schemes / Sebastien Canard and Jacques Traore
  • A Taxonomy of Single Sign-On Systems / Andreas Pashalidis and Chris J. Mitchell
  • Key Recovery Attacks on the RMAC, TMAC, and IACBC / Jaechul Sung, Deukjo Hong and Sangjin Lee
  • Key Recovery Attacks on NTRU without Ciphertext Validation Routine / Daewan Han, Jin Hong, Jae Woo Han and Daesung Kwon
  • Permanent Fault Attack on the Parameters of RSA with CRT / Sung-Ming Yen, SangJae Moon and JaeCheol Ha
  • Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts / Adam Young and Moti Yung
  • Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings / Fangguo Zhang and Kwangjo Kim
  • Digital Signature Schemes with Restriction on Signing Capability / Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee and JongIn Lim
  • On the Exact Security of Multi-signature Schemes Based on RSA / Kei Kawauchi and Mitsuru Tada
  • A Length-Flexible Threshold Cryptosystem with Applications / Ivan Damgard and Mads Jurik
  • Separating Encryption and Key Issuance in Digital Rights Management Systems / Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murata, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba and Hideki Imai
  • An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers / Yong Ho Hwang, Chong Hee Kim and Pil Joong Lee
  • Parallel Authentication and Public-Key Encryption / Josef Pieprzyk and David Pointcheval
  • Is Cross-Platform Security Possible? / Li Gong
  • A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems / Jason Reid, Ian Cheong, Matthew Henricksen and Jason Smith
  • Cryptanalysis of a New Cellular Automata Cryptosystem / Feng Bao
  • A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers / Chik How Tan, Xun Yi and Chee Kheong Siew
  • Clock-Controlled Shrinking Generator of Feedback Shift Registers / Ali Kanso
  • EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange / Yong Ho Hwang, Dae Hyun Yum and Pil Joong Lee
  • Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join / Vanesa Daza, Javier Herranz and German Saez
  • Robust Software Tokens - Yet Another Method for Securing User's Digital Identity / Taekyoung Kwon
  • Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders / Hwankoo Kim and SangJae Moon
  • New Constructions for Resilient and Highly Nonlinear Boolean Functions / Khoongming Khoo and Guang Gong
  • On Parallel Hash Functions Based on Block-Cipher / Toshihiko Matsuo and Kaoru Kurosawa
  • Square Hash with a Small Key Size / Swee-Huay Heng and Kaoru Kurosawa.