Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings
| 000 | 01481camuu2200373 a 4500 | |
| 001 | 000045560700 | |
| 005 | 20091119170745 | |
| 008 | 980623s1998 gw a b 101 0 eng | |
| 010 | ▼a 98035424 | |
| 020 | ▼a 3540647325 (pbk. : alk. paper) | |
| 020 | ▼a 9783540647324 (pbk. : alk. paper) | |
| 035 | ▼a (OCoLC)ocm39360628 | |
| 035 | ▼a (OCoLC)39360628 | |
| 035 | ▼a (KERIS)REF000004762226 | |
| 040 | ▼a DLC ▼c DLC ▼d DLC ▼d 211009 | |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b A279 1998 |
| 082 | 0 4 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b A181i ▼c 1998 | |
| 111 | 2 | ▼a ACISP '98 ▼d (1998 : ▼c Brisbane, Qld.) |
| 245 | 1 0 | ▼a Information security and privacy : ▼b Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings / ▼c Colin Boyd, Ed Dawson, (eds.). |
| 246 | 3 0 | ▼a ACISP '98 |
| 260 | ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1998. | |
| 300 | ▼a xi, 422 p. : ▼b ill. ; ▼c 24 cm. | |
| 490 | 1 | ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1438 |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer security ▼x Congresses. |
| 650 | 0 | ▼a Data protection ▼x Congresses. |
| 650 | 0 | ▼a Privacy, Right of ▼x Congresses. |
| 700 | 1 | ▼a Boyd, Colin. |
| 700 | 1 | ▼a Dawson, Ed ▼q (Edward) |
| 830 | 0 | ▼a Lecture notes in computer science ; ▼v 1438. |
| 945 | ▼a KINS |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 A181i 1998 | 등록번호 121186600 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.
정보제공 :
목차
CONTENTS Invited Speakers A Review of the SESAME Development / per Kaijser = 1 The Securiy of Public Key Cryptosystems Based on Integer Factorization / Siguna M$$\ddot u$$ ller ; Winfried B. M$$\ddot a$$ ller = 9 Network Security Ⅰ A Uniform Approach to Securing Unix Applications Using Sesame / Paul Ashley ; Mark Vandenwauver ; Bradley Broom = 24 Integrated Management of Network and Host Based Security Mechanisms / Rainer Falk ; Markus Trommer = 36 Covert Distributed Computing Using Java Through Web Spoofing / Jeffrey Horton ; Jennifer Seberry = 48 Block Ciphers Differential Cryptanalysis of a Block Cipher / Xun Yi ; Kwok Yan Lam ; Yongfei Han = 58 On Private-Key Cryptosystems Based on Product Codes / Hung-Min Sun ; Shiuh-Pyng Shieh = 68 Key Schedules of Iterative Block Ciphers / Gary Carter ; Ed Dawson ; Lauren Nielsen = 80 Network Security Ⅱ Low-Cost Secure Server Connection with Limited-Privilege Clients / Uri Blumenthal ; N. C. Hien ; J. H. Rooney = 90 A Solution to Open Standard of PKI / Qi He, Katia Sycara, Zhongmin Su = 99 Comparison of Commitment Schemes Used in Mix - Mediated Anonymous Communication for Preventing Pool-Mode Attacks / E. Franz ; A. Graubner ; A. Jerichow ; A. Pfitzmann = 111 Stream Ciphers Correlation Attacks on Up / Down Cascades / Jovan Dj. Goli$$c'$$ ; Renato Menicocci = 123 A Stream Cipher Based on Linear Feedback over GF (2^8) / Greg Rose = 135 A Probabilistic Correlation Attack on the Shrinking Generator / L. Simpson ; J. Dj. Goli$$c'$$ ; E. Dawson = 147 Authentication Codes and Boolean Functions Bounds and Constructions for A^3-code with Multi-senders / Rei Safavi-Naini ; Yejing Wang = 159 Rotation-Symmetric Functions and Fast Hashing / Josef Pieprzyk;Cheng Xin Qu = 169 How to Improve the Nonlinearity of Bijective S-Boxes / William Millan = 181 Software Security and Electronic Commerce Object Modeling of Cryptographic Algorithms with UML / Rauli Kaksonen ; Petri M$$\ddot A$$ h$$\ddot o$$ nen = 193 Adapting an Electronic Purse for Internet Payments / Martin Manninger ; Robert Schischka = 205 LITESET : A Light-Weight Secure Electronic Transaction Protocol / Goichiro Hanaoka ; Yuliang Zheng ; Hideki Imai = 215 Public Key Cryptography Applications of Linearised and Sub-linearised Polynomials to Information Security / Marie Henderson = 227 Protocol Failures Related to Order of Encryption and Signature : Computation of Discrete Logarithms in RSA Groups / Mark Chen ; Eric Hughes = 238 Hardware Protetion Against EEPROM Modification Attacks / W. W. Fung ; J. W. Gray, Ⅲ = 250 Trends in Quantum Cryptography in Czech RepubliC / Jaroslav Hruby = 261 Access Control A High Level Language for Conventional Access Control Models / Yun Bai ; Vijay Varadharajan = 273 Fast Access Control Decisions from Delegation Certificate Databases / Tuomas Aura = 284 Meta Objects for Access Control : Role-Based Principals / Thomas Riechmann ; J$$\ddot u$$ rgen Klein$$\ddot o$$ der = 296 A Dynamically Typed Access Control Model / Jonathon E. Tidswell ; John M. Potter = 308 Protocols Efficient Identity-Based Conference Key Distribution Protocols / Shahrokh Saeednia ; Rei Safavi-Naini = 320 A Formal Model for Systematic Design of Key Establishment Protocols / Castern Rudolph = 332 Key Establishment Protocols for Secure Mobile Communication : A Selective Survey / Colin Boyd ; Anish Mathuria = 344 Detecting Key-Dependencies / Tage Stabell-Kulφ ; Arne Helme ; Gianluca Dini = 356 Secret Sharing Secret Sharing in Multilevel and Compartmented Groups / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini = 367 On Construction of Cumulative Secret Sharing Schemes / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini ; Huaxiong Wang = 379 A Comment on the Efficiency of Secret Sharing Scheme over and Finite Abelian Group / Yuo Desmedt ; Brian King ; Wataru Kishimoto ; Kaoru Kurosawa = 391 Disital Signatures A User Identification System Using Signature Written with Mouse / Agus Fanar Syukri ; Eiji Okamoto ; Masahiro Mambo = 403 On Zhang's Nonrepudiable Proxy Signature Schemes / Narn-Yih Lee ; Tzonelih Hwang ; Chih-Hung Wang = 415 Author Index = 423
