Information Security and Privacy: 6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001. Proceedings (6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001.proceedings) - Lecture Notes in Computer Science - V Varadharajan - Books - Springer-Verlag Berlin and Heidelberg Gm - 9783540423003 - June 27, 2001
In case cover and title do not match, the title is correct

Information Security and Privacy: 6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001. Proceedings (6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001.proceedings) - Lecture Notes in Computer Science

V Varadharajan

Price
$ 65.49

Ordered from remote warehouse

Expected delivery Jun 28 - Jul 12
Add to your iMusic wish list

Information Security and Privacy: 6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001. Proceedings (6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001.proceedings) - Lecture Notes in Computer Science

This title constitutes the proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001. Among the topics addressed are systems security, network security, trust and access control, authentication, cryptography, cryptanalysis, and digital signatures.


Marc Notes: Includes bibliographical references and index.; Also available in print.; Electronic reproduction.; UK: MyiLibrary; 2008. Table of Contents: A Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.- Improved Cryptanalysis of the Self-Shrinking Generator.- Attacks Based on Small Factors in Various Group Structures.- On Classifying Conference Key Distribution Protocols.- Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.- New Public-Key Cryptosystem Using Divisor Class Groups.- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields.- Practical Key Recovery Schemes.- Non-deterministic Processors.- Personal Secure Booting.- Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules.- A Strategy for MLS Workflow.- Condition-Driven Integration of Security Services.- SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes.- Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.- Private Information Retrieval Based on the Subgroup Membership Problem.- A Practical English Auction with One-Time Registration.- A User Authentication Scheme with Identity and Location Privacy.- An End-to-End Authentication Protocol in Wireless Application Protocol.- Error Detection and Authentication in Quantum Key Distribution.- An Axiomatic Basis for Reasoning about Trust in PKIs.- A Knowledge-Based Approach to Internet Authorizations.- Applications of Trusted Review to Information Security.- Network Security Modeling and Cyber Attack Simulation Methodology.- Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.- Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS.- Improving the Availability of Time-Stamping Services.- Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group.- Democratic Systems.- Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme.- Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates.- How to Construct Fail-Stop Confirmer Signature Schemes.- Signature Schemes Based on 3rd Order Shift Registers.- Anonymous Statistical Survey of Attributes.- Secure Mobile Agent Using Strong Non-designated Proxy Signature.- Elliptic Curve Based Password Authenticated Key Exchange Protocols.- Elliptic Curve Cryptography on a Palm OS Device.- Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. Publisher Marketing: This title constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001. The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access control, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.

Media Books     Paperback Book   (Book with soft cover and glued back)
Released June 27, 2001
ISBN13 9783540423003
Publishers Springer-Verlag Berlin and Heidelberg Gm
Pages 522
Dimensions 156 × 234 × 27 mm   ·   748 g
Language German  
Editor Mu, Yi
Editor Varadharajan, Vijay