HOME > 상세정보

상세정보

Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings

Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings

자료유형
단행본
개인저자
Boyd, Colin. Dawson, Ed (Edward)
서명 / 저자사항
Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings / Colin Boyd, Ed Dawson, (eds.).
발행사항
Berlin ;   New York :   Springer,   c1998.  
형태사항
xi, 422 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1438
ISBN
3540647325 (pbk. : alk. paper) 9783540647324 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Data protection -- Congresses. Privacy, Right of -- Congresses.
000 01481camuu2200373 a 4500
001 000045560700
005 20091119170745
008 980623s1998 gw a b 101 0 eng
010 ▼a 98035424
020 ▼a 3540647325 (pbk. : alk. paper)
020 ▼a 9783540647324 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm39360628
035 ▼a (OCoLC)39360628
035 ▼a (KERIS)REF000004762226
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b A279 1998
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 1998
111 2 ▼a ACISP '98 ▼d (1998 : ▼c Brisbane, Qld.)
245 1 0 ▼a Information security and privacy : ▼b Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings / ▼c Colin Boyd, Ed Dawson, (eds.).
246 3 0 ▼a ACISP '98
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1998.
300 ▼a xi, 422 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1438
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼x Congresses.
650 0 ▼a Data protection ▼x Congresses.
650 0 ▼a Privacy, Right of ▼x Congresses.
700 1 ▼a Boyd, Colin.
700 1 ▼a Dawson, Ed ▼q (Edward)
830 0 ▼a Lecture notes in computer science ; ▼v 1438.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A181i 1998 등록번호 121186600 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.


정보제공 : Aladin

목차


CONTENTS

Invited Speakers

 A Review of the SESAME Development / per Kaijser = 1

 The Securiy of Public Key Cryptosystems Based on Integer Factorization / Siguna M$$\ddot u$$ller ; Winfried B. M$$\ddot a$$ller = 9

Network Security Ⅰ

 A Uniform Approach to Securing Unix Applications Using Sesame / Paul Ashley ; Mark Vandenwauver ; Bradley Broom = 24

 Integrated Management of Network and Host Based Security Mechanisms / Rainer Falk ; Markus Trommer = 36

 Covert Distributed Computing Using Java Through Web Spoofing / Jeffrey Horton ; Jennifer Seberry = 48

Block Ciphers

 Differential Cryptanalysis of a Block Cipher / Xun Yi ; Kwok Yan Lam ; Yongfei Han = 58

 On Private-Key Cryptosystems Based on Product Codes / Hung-Min Sun ; Shiuh-Pyng Shieh = 68

 Key Schedules of Iterative Block Ciphers / Gary Carter ; Ed Dawson ; Lauren Nielsen = 80

Network Security Ⅱ

 Low-Cost Secure Server Connection with Limited-Privilege Clients / Uri Blumenthal ; N. C. Hien ; J. H. Rooney = 90

 A Solution to Open Standard of PKI / Qi He, Katia Sycara, Zhongmin Su = 99

 Comparison of Commitment Schemes Used in Mix - Mediated Anonymous Communication for Preventing Pool-Mode Attacks / E. Franz ; A. Graubner ; A. Jerichow ; A. Pfitzmann = 111

Stream Ciphers

 Correlation Attacks on Up / Down Cascades / Jovan Dj. Goli$$c'$$ ; Renato Menicocci = 123

 A Stream Cipher Based on Linear Feedback over GF (2^8) / Greg Rose = 135

 A Probabilistic Correlation Attack on the Shrinking Generator / L. Simpson ; J. Dj. Goli$$c'$$ ; E. Dawson = 147

Authentication Codes and Boolean Functions

 Bounds and Constructions for A^3-code with Multi-senders / Rei Safavi-Naini ; Yejing Wang = 159

 Rotation-Symmetric Functions and Fast Hashing / Josef Pieprzyk;Cheng Xin Qu = 169

 How to Improve the Nonlinearity of Bijective S-Boxes / William Millan = 181

Software Security and Electronic Commerce

 Object Modeling of Cryptographic Algorithms with UML / Rauli Kaksonen ; Petri M$$\ddot A$$h$$\ddot o$$nen = 193

 Adapting an Electronic Purse for Internet Payments / Martin Manninger ; Robert Schischka = 205

 LITESET : A Light-Weight Secure Electronic Transaction Protocol / Goichiro Hanaoka ; Yuliang Zheng ; Hideki Imai = 215

Public Key Cryptography

 Applications of Linearised and Sub-linearised Polynomials to Information Security / Marie Henderson = 227

 Protocol Failures Related to Order of Encryption and Signature : Computation of Discrete Logarithms in RSA Groups / Mark Chen ; Eric Hughes = 238

Hardware

 Protetion Against EEPROM Modification Attacks / W. W. Fung ; J. W. Gray, Ⅲ = 250

 Trends in Quantum Cryptography in Czech RepubliC / Jaroslav Hruby = 261

Access Control

 A High Level Language for Conventional Access Control Models / Yun Bai ; Vijay Varadharajan = 273

 Fast Access Control Decisions from Delegation Certificate Databases / Tuomas Aura = 284

 Meta Objects for Access Control : Role-Based Principals / Thomas Riechmann ; J$$\ddot u$$rgen Klein$$\ddot o$$der = 296

 A Dynamically Typed Access Control Model / Jonathon E. Tidswell ; John M. Potter = 308

Protocols

 Efficient Identity-Based Conference Key Distribution Protocols / Shahrokh Saeednia ; Rei Safavi-Naini = 320

 A Formal Model for Systematic Design of Key Establishment Protocols / Castern Rudolph = 332

 Key Establishment Protocols for Secure Mobile Communication : A Selective Survey / Colin Boyd ; Anish Mathuria = 344

 Detecting Key-Dependencies / Tage Stabell-Kulφ ; Arne Helme ; Gianluca Dini = 356

Secret Sharing

 Secret Sharing in Multilevel and Compartmented Groups / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini = 367

 On Construction of Cumulative Secret Sharing Schemes / Hossein Ghodosi ; Josef Pieprzyk ; Rei Safavi-Naini ; Huaxiong Wang = 379

 A Comment on the Efficiency of Secret Sharing Scheme over and Finite Abelian Group / Yuo Desmedt ; Brian King ; Wataru Kishimoto ; Kaoru Kurosawa = 391

Disital Signatures

 A User Identification System Using Signature Written with Mouse / Agus Fanar Syukri ; Eiji Okamoto ; Masahiro Mambo = 403

 On Zhang's Nonrepudiable Proxy Signature Schemes / Narn-Yih Lee ; Tzonelih Hwang ; Chih-Hung Wang = 415

Author Index = 423



관련분야 신착자료

Harvard Business Review (2025)