×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings / Edition 1
     

Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings / Edition 1

by Ed Dawson, Andrew Clark, Colin Boyd
 

ISBN-10: 3540677429

ISBN-13: 9783540677420

Pub. Date: 07/31/2000

Publisher: Springer Berlin Heidelberg

This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000.
The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on

Overview

This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000.
The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and prools.

Product Details

ISBN-13:
9783540677420
Publisher:
Springer Berlin Heidelberg
Publication date:
07/31/2000
Series:
Lecture Notes in Computer Science Series , #1841
Edition description:
2000
Pages:
488
Product dimensions:
9.21(w) x 6.14(h) x 1.01(d)

Table of Contents

Network Security I.- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System.- Towards a New Authorisation Paradigm for Extranets.- Custom Safety Policies in Safe Erlang.- Public Key Cryptography.- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance.- Network Security II.- High Performance Agile Crypto Modules.- A Three-Party HTTP Proxy to Support Internet Content Regulation.- Cryptographic Implementation Issues.- Cryptanalysis of the m – Permutation Protection Schemes.- An Implementation of Bitsliced DES on the Pentium MMXTM Processor.- Electronic Commerce I.- Securing Large E-Commerce Networks.- Passive Entities: A Strategy for Electronic Payment Design.- Key Recovery.- Key Recovery System for the Commercial Environment.- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication.- Public Key Infrastructure.- Key Management for Secure Multicast with Dynamic Controller.- PKI Seeks a Trusting Relationship.- The PKI Specification Dilemma: A Formal Solution.- Boolean Functions.- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator.- Security Weaknesses in a Randomized Stream Cipher.- Two-Stage Optimisation in the Design of Boolean Functions.- Intrusion Detection.- A Novel Engine for Various Intrusion Detection Methods.- Codes.- Construction and Categories of Codes.- Digital Signatures I.- Cryptanalysis of Polynomial Authentication and Signature Scheme.- Secure Transactions with Mobile Agents in Hostile Environments.- A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability.- Secret Sharing I.- Light Weight Broadcast Exclusion Using Secret Sharing.- Cheating Prevention in Secret Sharing.- On Multiplicative Secret Sharing Schemes.- Digital Signatures II.- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures.- Fail-Stop Confirmer Signatures.- An Extremely Small and Efficient Identification Scheme.- Prools.- An Anonymous Electronic Bidding Prool Based on a New Convertible Group Signature Scheme.- AKA Prools for Mobile Communications.- Electronic Commerce II.- A Three Phased Schema for Sealed Bid Auction System Design.- An Online Public Auction Prool Protecting Bidder Privacy.- Secret Sharing II.- Algorithms to Speed Up Computations in Threshold RSA.- Sharing Block Ciphers.- Keynote Papers.- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce.- Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society.

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews