Information security and privacy : 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings /
Saved in:
Meeting name: | ACISP (Conference (8th : 2003 : Wollongong, N.S.W.) |
---|---|
Imprint: | Berlin ; New York : Springer, 2003. |
Description: | xii, 534 p. : ill. ; 24 cm. |
Language: | English |
Series: | Lecture notes in computer science ; 2727 |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/4899277 |
Table of Contents:
- Grouping Verifiable Content for Selective Disclosure / Laurence Bull, David McG. Squire, Jan Newmarch and Yuliang Zheng
- Evaluation of Anonymity of Practical Anonymous Communication Networks / Shigeki Kitazawa, Masakazu Soshi and Atsuko Miyaji
- An Anonymous Credential System and a Privacy-Aware PKI / Pino Persiano and Ivan Visconti
- Flaws in Some Robust Optimistic Mix-Nets / Masayaki Abe and Hideki Imai
- The Unsolvable Privacy Problem and Its Implications for Security Technologies / Andrew Odlyzko
- The Security of Fixed versus Random Elliptic Curves in Cryptography / Yvonne Hitchcock, Paul Montague, Gary Carter and Ed Dawson
- Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains / Dong-Guk Han, Nam Su Chang, Seak Won Jung, Young-Ho Park, Chang Han Kim and Heuisu Ryu
- Generic GF (2[superscript m]) Arithmetic in Software and Its Application to ECC / Andre Weimerskirch, Douglas Stebila and Sheueling Chang Shantz
- An Addition Algorithm in Jacobian of C[subscript 34] Curve / Seigo Arita
- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces / Sung-Ming Yen
- Differential Fault Analysis on AES Key Schedule and Some Countermeasures / Chien-Ning Chen and Sung-Ming Yen
- On the Pseudorandomness of KASUMI Type Permutations / Tetsu Iwata, Tohru Yagi and Kaoru Kurosawa
- Theoretical Analysis of X[superscript 2] Attack on RC6 / Masahiko Takenaka, Takeshi Shimoyama and Takeshi Koshiba
- A Typed Theory for Access Control and Information Flow Control in Mobile Systems / Libin Wang and Kefei Chen
- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach / Yiu Shing Terry Tin, Colin Boyd and Juan Manuel Gonzalez Nieto
- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications / Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah and Sungwon Sohn
- Practical Pay TV Schemes / Arvind Narayanan, C. Pandu Rangan and Kwangjo Kim
- Cooperative Routers against DoS Attacks / Ha Yoon Song and Han-gyoo Kim
- Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs / Tao Peng, Christopher Leckie and Kotagiri Ramamohanarao
- Malicious ICMP Tunneling: Defense against the Vulnerability / Abhishek Singh, Ola Nordstrom, Chenghuai Lu and Andre L. M. dos Santos
- On Fair E-cash Systems Based on Group Signature Schemes / Sebastien Canard and Jacques Traore
- A Taxonomy of Single Sign-On Systems / Andreas Pashalidis and Chris J. Mitchell
- Key Recovery Attacks on the RMAC, TMAC, and IACBC / Jaechul Sung, Deukjo Hong and Sangjin Lee
- Key Recovery Attacks on NTRU without Ciphertext Validation Routine / Daewan Han, Jin Hong, Jae Woo Han and Daesung Kwon
- Permanent Fault Attack on the Parameters of RSA with CRT / Sung-Ming Yen, SangJae Moon and JaeCheol Ha
- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts / Adam Young and Moti Yung
- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings / Fangguo Zhang and Kwangjo Kim
- Digital Signature Schemes with Restriction on Signing Capability / Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee and JongIn Lim
- On the Exact Security of Multi-signature Schemes Based on RSA / Kei Kawauchi and Mitsuru Tada
- A Length-Flexible Threshold Cryptosystem with Applications / Ivan Damgard and Mads Jurik
- Separating Encryption and Key Issuance in Digital Rights Management Systems / Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murata, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba and Hideki Imai
- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers / Yong Ho Hwang, Chong Hee Kim and Pil Joong Lee
- Parallel Authentication and Public-Key Encryption / Josef Pieprzyk and David Pointcheval
- Is Cross-Platform Security Possible? / Li Gong
- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems / Jason Reid, Ian Cheong, Matthew Henricksen and Jason Smith
- Cryptanalysis of a New Cellular Automata Cryptosystem / Feng Bao
- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers / Chik How Tan, Xun Yi and Chee Kheong Siew
- Clock-Controlled Shrinking Generator of Feedback Shift Registers / Ali Kanso
- EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange / Yong Ho Hwang, Dae Hyun Yum and Pil Joong Lee
- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join / Vanesa Daza, Javier Herranz and German Saez
- Robust Software Tokens - Yet Another Method for Securing User's Digital Identity / Taekyoung Kwon
- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders / Hwankoo Kim and SangJae Moon
- New Constructions for Resilient and Highly Nonlinear Boolean Functions / Khoongming Khoo and Guang Gong
- On Parallel Hash Functions Based on Block-Cipher / Toshihiko Matsuo and Kaoru Kurosawa
- Square Hash with a Small Key Size / Swee-Huay Heng and Kaoru Kurosawa.