PORTO-
FREI

Information Security and Privacy

6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings

program,andallthesessionchairsandspeakersfortheirtimeande?ort. Special thanks to Yi Mu, Laura Olsen, Rajan Shankaran, and Michael Hitchens for theirhelpwithlocalorganizationdetails. Finally,Iwouldliketothankallthe authorswhosubmittedpapersandalltheparticipantsofACISP2001. Ihope thattheprofessionalcontactsmadeatthisconference,thepresentations,and theproceedingshaveo?eredyouinsightsandideasthatyoucanapplytoyour owne?ortsinsecurityandprivacy. July2001 VijayVaradharajan AUSTRALASIANCONFERENCEON INFORMATIONSECURITYANDPRIVACY ACISP2001 Sponsoredby MacquarieUniversity AustralianComputerSociety General Chair: VijayVaradharajan MacquarieUniversity,Australia Program Chairs: VijayVaradharajan MacquarieUniversity,Australia YiMu MacquarieUniversity,Australia Program Committee: RossAnderson CambridgeUniversity,UK ColinBoyd QueenslandUniversityofTechnology,Australia EdDawson QueenslandUniversityofTechnology,Australia YvoDesmedt FloridaStateUniversity,USA PaulEngland Microsoft YairFrankel ColumbiaUniversity,USA AjoyGhosh UNISYS,Australia DieterGollman Microsoft JohnGordon ConceptLabs,UK KwangjoKim ICU,Korea ChuchangLiu DSTO,Australia MasahiroMambo TohokuUniversity,Japan WenboMao Hewlett-PackardLab. ,UK ChrisMitchell LondonUniversity,UK EijiOkamoto UniversityofWisconsin,USA JoePato Hewlett-PackardLab. ,USA JosefPieprzyk MacquarieUniversity,Australia BartPreneel KatholiekeUniversity,Belgium SteveRoberts WithamPtyLtd,Australia QingSihan AcademyofScience,China ReiSafavi-Naini UniversityofWollongong,Australia JenniferSeberry UniversityofWollongong,Australia YuliangZheng MonashUniversity,Australia TableofContents AFewThoughtsonE-Commerce. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 YacovYacobi NewCBC-MACForgeryAttacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 KarlBrincat,ChrisJ. Mitchell CryptanalysisofaPublicKeyCryptosystemProposedatACISP2000. . . . 15 AmrYoussef,GuangGong ImprovedCryptanalysisoftheSelf-ShrinkingGenerat

Buch (Kartoniert)

EUR 53,49

Alle Preisangaben inkl. MwSt.

Auch verfügbar als:

  Verlagsbedingte Lieferzeit ca. 3 - 6 Werktage.
(Print on Demand. Lieferbar innerhalb von 3 bis 6 Tagen)

Versandkostenfrei*

Dieser Artikel kann nicht bestellt werden.
 

Produktbeschreibung

program,andallthesessionchairsandspeakersfortheirtimeande?ort. Special thanks to Yi Mu, Laura Olsen, Rajan Shankaran, and Michael Hitchens for theirhelpwithlocalorganizationdetails. Finally,Iwouldliketothankallthe authorswhosubmittedpapersandalltheparticipantsofACISP2001. Ihope thattheprofessionalcontactsmadeatthisconference,thepresentations,and theproceedingshaveo?eredyouinsightsandideasthatyoucanapplytoyour owne?ortsinsecurityandprivacy. July2001 VijayVaradharajan AUSTRALASIANCONFERENCEON INFORMATIONSECURITYANDPRIVACY ACISP2001 Sponsoredby MacquarieUniversity AustralianComputerSociety General Chair: VijayVaradharajan MacquarieUniversity,Australia Program Chairs: VijayVaradharajan MacquarieUniversity,Australia YiMu MacquarieUniversity,Australia Program Committee: RossAnderson CambridgeUniversity,UK ColinBoyd QueenslandUniversityofTechnology,Australia EdDawson QueenslandUniversityofTechnology,Australia YvoDesmedt FloridaStateUniversity,USA PaulEngland Microsoft YairFrankel ColumbiaUniversity,USA AjoyGhosh UNISYS,Australia DieterGollman Microsoft JohnGordon ConceptLabs,UK KwangjoKim ICU,Korea ChuchangLiu DSTO,Australia MasahiroMambo TohokuUniversity,Japan WenboMao Hewlett-PackardLab. ,UK ChrisMitchell LondonUniversity,UK EijiOkamoto UniversityofWisconsin,USA JoePato Hewlett-PackardLab. ,USA JosefPieprzyk MacquarieUniversity,Australia BartPreneel KatholiekeUniversity,Belgium SteveRoberts WithamPtyLtd,Australia QingSihan AcademyofScience,China ReiSafavi-Naini UniversityofWollongong,Australia JenniferSeberry UniversityofWollongong,Australia YuliangZheng MonashUniversity,Australia TableofContents AFewThoughtsonE-Commerce. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 YacovYacobi NewCBC-MACForgeryAttacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 KarlBrincat,ChrisJ. Mitchell CryptanalysisofaPublicKeyCryptosystemProposedatACISP2000. . . . 15 AmrYoussef,GuangGong ImprovedCryptanalysisoftheSelf-ShrinkingGenerat 

Inhaltsverzeichnis

A Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a
Public Key Cryptosystem Proposed at ACISP 2000.- Improved Cryptanalysis of the
Self-Shrinking Generator.- Attacks Based on Small Factors in Various Group
Structures.- On Classifying Conference Key Distribution Protocols.-
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.- New
Public-Key Cryptosystem Using Divisor Class Groups.- First Implementation of
Cryptographic Protocols Based on Algebraic Number Fields.- Practical Key
Recovery Schemes.- Non-deterministic Processors.- Personal Secure Booting.-
Evaluation of Tamper-Resistant Software Deviating from Structured Programming
Rules.- A Strategy for MLS Workflow.- Condition-Driven Integration of Security
Services.- SKETHIC: Secure Kernel Extension against Trojan Horses with Informat
ion-Carrying Codes.- Secure and Private Distribution of Online Video and Some
Related Cryptographic Issues.- Private Information Retrieval Based on the
Subgroup Membership Problem.- A Practical English Auction with One-Time
Registration.- A User Authentication Scheme with Identity and Location Privacy.-
An End-to-End Authentication Protocol in Wireless Application Protocol.- Error
Detection and Authentication in Quantum Key Distribution.- An Axiomatic Basis
for Reasoning about Trust in PKIs.- A Knowledge-Based Approach to Internet
Authorizations.- Applications of Trusted Review to Information Security.-
Network Security Modeling and Cyber Attack Simulation Methodology.-
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.-
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their
Impact on QoS.- Improving the Availability of Time-Stamping Services.-
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite
Abelian Group.- Democratic Systems.- Efficient and Unconditionally Secure
Verifiable Threshold Changeable Scheme.- Provably Secure Distributed Schnorr
Signatures and a (t, n) Threshold Scheme for Implicit Certificates.- How to
Construct Fail-Stop Confirmer Signature Schemes.- Signature Schemes Based on 3rd
Order Shift Registers.- Anonymous Statistical Survey of Attributes.- Secure
Mobile Agent Using Strong Non-designated Proxy Signature.- Elliptic Curve Based
Password Authenticated Key Exchange Protocols.- Elliptic Curve Cryptography on a
Palm OS Device.- Reducing Certain Elliptic Curve Discrete Logarithms to
Logarithms in a Finite Field. 

Mehr vom Verlag:

k.A.

Mehr aus der Reihe:

Produktdetails

Medium: Buch
Format: Kartoniert
Seiten: 540
Sprache: Englisch
Erschienen: Juni 2001
Auflage: 2001
Band-Nr.: I,5
Maße: 235 x 155 mm
Gewicht: 809 g
ISBN-10: 3540423001
ISBN-13: 9783540423003

Bestell-Nr.: 4106529 
Libri-Verkaufsrang (LVR):
Libri-Relevanz: 0 (max 9.999)
 

Ist ein Paket? 0
Rohertrag: 11,50 €
Porto: 2,75 €
Deckungsbeitrag: 8,75 €

LIBRI: 1641611
LIBRI-EK*: 38.49 € (23%)
LIBRI-VK: 53,49 €
Libri-STOCK: 0
LIBRI: 097 Print on Demand. Lieferbar innerhalb von 7 bis 10 Tagen * EK = ohne MwSt.

UVP: 2 
Warengruppe: 16320 

KNO: 22334238
KNO-EK*: 42.45 € (25%)
KNO-VK: 53,49 €
KNO-STOCK: 0
KNO-MS: 18

KNO-SAMMLUNG: Lecture Notes in Computer Science 2119
KNOABBVERMERK: 2001. xi, 522 S. XI, 522 p. 235 mm
KNOMITARBEITER: Herausgegeben:Varadharajan, Vijay; Mu, Yi
KNO-BandNr. Text:I,5
Einband: Kartoniert
Auflage: 2001
Sprache: Englisch
Beilage(n): Paperback

Alle Preise inkl. MwSt. , innerhalb Deutschlands liefern wir immer versandkostenfrei . Informationen zum Versand ins Ausland .

Kostenloser Versand *

innerhalb eines Werktages

OHNE RISIKO

30 Tage Rückgaberecht

Käuferschutz

mit Geld-Zurück-Garantie