My Account Log in

1 option

Information Security and Privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings / edited by Vijay Varadharajan, Yi Mu.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Varadharajan, Vijay, editor.
Mu, Yi, 1955- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 2119.
Lecture Notes in Computer Science, 0302-9743 ; 2119
Language:
English
Subjects (All):
Computer security.
Data encryption (Computer science).
Management information systems.
Computer science.
Computer networks.
Algorithms.
Computers and civilization.
Systems and Data Security.
Cryptology.
Management of Computing and Information Systems.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Computers and Society.
Local Subjects:
Systems and Data Security.
Cryptology.
Management of Computing and Information Systems.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Computers and Society.
Physical Description:
1 online resource (XI, 522 pages).
Edition:
First edition 2001.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2001.
System Details:
text file PDF
Contents:
A Few Thoughts on E-Commerce
New CBC-MAC Forgery Attacks
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Improved Cryptanalysis of the Self-Shrinking Generator
Attacks Based on Small Factors in Various Group Structures
On Classifying Conference Key Distribution Protocols
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI
New Public-Key Cryptosystem Using Divisor Class Groups
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
Practical Key Recovery Schemes
Non-deterministic Processors
Personal Secure Booting
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules
A Strategy for MLS Workflow
Condition-Driven Integration of Security Services
SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
Private Information Retrieval Based on the Subgroup Membership Problem
A Practical English Auction with One-Time Registration
A User Authentication Scheme with Identity and Location Privacy
An End-to-End Authentication Protocol in Wireless Application Protocol
Error Detection and Authentication in Quantum Key Distribution
An Axiomatic Basis for Reasoning about Trust in PKIs
A Knowledge-Based Approach to Internet Authorizations
Applications of Trusted Review to Information Security
Network Security Modeling and Cyber Attack Simulation Methodology
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS
Improving the Availability of Time-Stamping Services
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group
Democratic Systems
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates
How to Construct Fail-Stop Confirmer Signature Schemes
Signature Schemes Based on 3rd Order Shift Registers
Anonymous Statistical Survey of Attributes
Secure Mobile Agent Using Strong Non-designated Proxy Signature
Elliptic Curve Based Password Authenticated Key Exchange Protocols
Elliptic Curve Cryptography on a Palm OS Device
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.
Other Format:
Printed edition:
ISBN:
978-3-540-47719-8
9783540477198
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account