HOME > 상세정보

상세정보

Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings

Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings

자료유형
단행본
개인저자
Pieprzyk, Josef, 1949-. Ghodosi, Hossein. Dawson, Ed (Edward)
서명 / 저자사항
Information security and privacy : 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings / Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.).
발행사항
Berlin ;   New York :   Springer,   c2007.  
형태사항
xiv, 476 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 4586
ISBN
9783540734574 (pbk.) 3540734570 (pbk.)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses.
000 01481camuu2200385 a 4500
001 000045560704
005 20091119165358
008 070525s2007 gw a b 101 0 eng d
010 ▼a 2007929635
020 ▼a 9783540734574 (pbk.)
020 ▼a 3540734570 (pbk.)
035 ▼a (OCoLC)ocm145453814
035 ▼a (OCoLC)145453814
035 ▼a (KERIS)REF000013555505
040 ▼a OHX ▼c OHX ▼d CUS ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA76.9.A25 ▼b A279 2007
072 7 ▼a QA ▼2 lcco
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A181i ▼c 2007
111 2 ▼a ACISP 2007 ▼d (2007 : ▼c Townsville, Qld.)
245 1 0 ▼a Information security and privacy : ▼b 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings / ▼c Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.).
246 3 0 ▼a ACISP 2007
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2007.
300 ▼a xiv, 476 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 4586
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
700 1 ▼a Pieprzyk, Josef, ▼d 1949-.
700 1 ▼a Ghodosi, Hossein.
700 1 ▼a Dawson, Ed ▼q (Edward)
830 0 ▼a Lecture notes in computer science ; ▼v 4586.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A181i 2007 등록번호 121186596 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Here is a highly relevant book that covers a wide array of key aspects in information security.

With numerous scares in recent months over the way information is stored and handled, and over the vagaries of e-commerce, you'll find few more relevant texts in the subject area.

The book constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007.

There are no fewer than 33 revised full papers presented in this volume, all of which have been carefully reviewed. They were selected from 132 submissions.

The papers are organized in topical sections on, among other subjects, stream ciphers, hashing, biometrics, and secret sharing.

Also covered are cryptanalysis, public key cryptography, authentication, e-commerce, and security.


정보제공 : Aladin

목차

Stream Ciphers.- An Analysis of the Hermes8 Stream Ciphers.- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.- Strengthening NLS Against Crossword Puzzle Attack.- Hashing.- A New Strategy for Finding a Differential Path of SHA-1.- Preimage Attack on the Parallel FFT-Hashing Function.- Second Preimages for Iterated Hash Functions and Their Implications on MACs.- On Building Hash Functions from Multivariate Quadratic Equations.- Biometrics.- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.- Soft Generation of Secure Biometric Keys.- Secret Sharing.- Flaws in Some Secret Sharing Schemes Against Cheating.- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters.- Cryptanalysis.- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.- Analysis of the SMS4 Block Cipher.- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.- Public Key Cryptography.- : A Hardware-Oriented Trapdoor Cipher.- Anonymity on Paillier's Trap-Door Permutation.- Generic Certificateless Key Encapsulation Mechanism.- Double-Size Bipartite Modular Multiplication.- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.- Authentication.- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.- Certificateless Signature Revisited.- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.- Hash-and-Sign with Weak Hashing Made Secure.- "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing.- Threshold Anonymous Group Identification and Zero-Knowledge Proof.- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.- E-Commerce.- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.- Efficient and Secure Comparison for On-Line Auctions.- Practical Compact E-Cash.- Security.- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.- On Proactive Perfectly Secure Message Transmission.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)