FEEDBACK Smiley face
Normal view MARC view ISBD view

Information Security and Privacy [electronic resource] :14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings /

Contributor(s): Boyd, Colin [editor.] | González Nieto, Juan [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 5594Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.Description: XI, 470 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642026201.Subject(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Coding theory | Algorithms | Management information systems | Computer Science | Computer Communication Networks | Systems and Data Security | Data Encryption | Management of Computing and Information Systems | Coding and Information Theory | Algorithm Analysis and Problem ComplexityOnline resources: Click here to access online
Contents:
Invited Lecture -- Is the Information Security King Naked? -- Network Security -- Measurement Study on Malicious Web Servers in the .nz Domain -- A Combinatorial Approach for an Anonymity Metric -- On Improving the Accuracy and Performance of Content-Based File Type Identification -- Symmetric Key Encryption -- Attacking 9 and 10 Rounds of AES-256 -- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure -- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT -- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher -- Testing Stream Ciphers by Finding the Longest Substring of a Given Density -- New Correlations of RC4 PRGA Using Nonzero-Bit Differences -- Hash Functions -- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders -- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security -- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 -- Inside the Hypercube -- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others -- On the Weak Ideal Compression Functions -- Invited Lecture -- Hardening the Network from the Friend Within -- Public Key Cryptography -- Reducing the Complexity in the Distributed Computation of Private RSA Keys -- Efficiency Bounds for Adversary Constructions in Black-Box Reductions -- Building Key-Private Public-Key Encryption Schemes -- Multi-recipient Public-Key Encryption from Simulators in Security Proofs -- Fair Threshold Decryption with Semi-Trusted Third Parties -- Conditional Proxy Broadcast Re-Encryption -- Security on Hybrid Encryption with the Tag-KEM/DEM Framework -- Protocols -- A Highly Scalable RFID Authentication Protocol -- Strengthening the Security of Distributed Oblivious Transfer -- Towards Denial-of-Service-Resilient Key Agreement Protocols -- A Commitment-Consistent Proof of a Shuffle -- Implementation -- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography -- Random Order m-ary Exponentiation -- Jacobi Quartic Curves Revisited.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009, held in Brisbane, Australia, during July 1-3, 2009. The 29 revised full papers presented together with two invited talks were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on network security, symmetric key encryption, hash functions, public key cryptography, protocols, and implementation.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Invited Lecture -- Is the Information Security King Naked? -- Network Security -- Measurement Study on Malicious Web Servers in the .nz Domain -- A Combinatorial Approach for an Anonymity Metric -- On Improving the Accuracy and Performance of Content-Based File Type Identification -- Symmetric Key Encryption -- Attacking 9 and 10 Rounds of AES-256 -- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure -- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT -- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher -- Testing Stream Ciphers by Finding the Longest Substring of a Given Density -- New Correlations of RC4 PRGA Using Nonzero-Bit Differences -- Hash Functions -- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders -- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security -- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 -- Inside the Hypercube -- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others -- On the Weak Ideal Compression Functions -- Invited Lecture -- Hardening the Network from the Friend Within -- Public Key Cryptography -- Reducing the Complexity in the Distributed Computation of Private RSA Keys -- Efficiency Bounds for Adversary Constructions in Black-Box Reductions -- Building Key-Private Public-Key Encryption Schemes -- Multi-recipient Public-Key Encryption from Simulators in Security Proofs -- Fair Threshold Decryption with Semi-Trusted Third Parties -- Conditional Proxy Broadcast Re-Encryption -- Security on Hybrid Encryption with the Tag-KEM/DEM Framework -- Protocols -- A Highly Scalable RFID Authentication Protocol -- Strengthening the Security of Distributed Oblivious Transfer -- Towards Denial-of-Service-Resilient Key Agreement Protocols -- A Commitment-Consistent Proof of a Shuffle -- Implementation -- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography -- Random Order m-ary Exponentiation -- Jacobi Quartic Curves Revisited.

This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009, held in Brisbane, Australia, during July 1-3, 2009. The 29 revised full papers presented together with two invited talks were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on network security, symmetric key encryption, hash functions, public key cryptography, protocols, and implementation.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in