Information Security and Privacy [electronic resource] :6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11–13, 2001 Proceedings /
Contributor(s): Varadharajan, Vijay [editor.] | Mu, Yi [editor.] | SpringerLink (Online service).Material type: BookSeries: Lecture Notes in Computer Science: 2119Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2001.Description: XI, 522 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540477198.Subject(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Algorithms | Computers and civilization | Management information systems | Computer Science | Systems and Data Security | Data Encryption | Management of Computing and Information Systems | Computer Communication Networks | Algorithm Analysis and Problem Complexity | Computers and SocietyOnline resources: Click here to access online
A Few Thoughts on E-Commerce -- New CBC-MAC Forgery Attacks -- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000 -- Improved Cryptanalysis of the Self-Shrinking Generator -- Attacks Based on Small Factors in Various Group Structures -- On Classifying Conference Key Distribution Protocols -- Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI -- New Public-Key Cryptosystem Using Divisor Class Groups -- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields -- Practical Key Recovery Schemes -- Non-deterministic Processors -- Personal Secure Booting -- Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules -- A Strategy for MLS Workflow -- Condition-Driven Integration of Security Services -- SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes -- Secure and Private Distribution of Online Video and Some Related Cryptographic Issues -- Private Information Retrieval Based on the Subgroup Membership Problem -- A Practical English Auction with One-Time Registration -- A User Authentication Scheme with Identity and Location Privacy -- An End-to-End Authentication Protocol in Wireless Application Protocol -- Error Detection and Authentication in Quantum Key Distribution -- An Axiomatic Basis for Reasoning about Trust in PKIs -- A Knowledge-Based Approach to Internet Authorizations -- Applications of Trusted Review to Information Security -- Network Security Modeling and Cyber Attack Simulation Methodology -- Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks -- Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS -- Improving the Availability of Time-Stamping Services -- Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group -- Democratic Systems -- Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme -- Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates -- How to Construct Fail-Stop Confirmer Signature Schemes -- Signature Schemes Based on 3rd Order Shift Registers -- Anonymous Statistical Survey of Attributes -- Secure Mobile Agent Using Strong Non-designated Proxy Signature -- Elliptic Curve Based Password Authenticated Key Exchange Protocols -- Elliptic Curve Cryptography on a Palm OS Device -- Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.