000 04600nam a22006135i 4500
001 978-3-540-69237-9
003 DE-He213
005 20170515111448.0
007 cr nn 008mamaa
008 121227s1997 gw | s |||| 0|eng d
020 _a9783540692379
_9978-3-540-69237-9
024 7 _a10.1007/BFb0027916
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aInformation Security and Privacy
_h[electronic resource] :
_bSecond Australasian Conference, ACISP'97 Sydney, NSW, Australia, July 7–9, 1997 Proceedings /
_cedited by Vijay Varadharajan, Josef Pieprzyk, Yi Mu.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1997.
300 _aXIII, 343 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1270
505 0 _aTrusted third parties for secure electronic commerce — Are they needed -- Prospectives for modelling trust in information security -- Analysis and implementation of a formal authorization policy design approach -- An approach to dynamic domain and type enforcement -- Purpose-oriented access control model in object-based systems -- User Access Domain Management System-ADAMS -- Revocation of unread e-mail in an untrusted network -- Security issues in asynchronous transfer mode -- A method to implement a denial of service protection base -- ProtectOS: Operating system and hardware support for small objects -- Practical memory checkers for stacks, queues and deques -- Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields -- A new hash function based on block cipher -- New lower bounds on nonlinearity and a class of highly nonlinear functions -- On the security of self-synchronous ciphers -- Inefficiency of variant characteristics for substitution-permutation networks with position permutations -- Secret sharing with reusable polynomials -- A message authentication code based on latin squares -- Characterization of (k, n) multi-receiver authentication -- Cryptanalysis of adaptive arithmetic coding encryption schemes -- Fast correlation attacks and multiple linear approximations -- Verifiable escrowed signature -- Democratic key escrow scheme -- Design and analyses of two basic protocols for use in TTP-based Key escrow -- Protection of data and delegated keys in digital distribution -- New micropayment schemes based on Pay Words -- On key agreement and conference key agreement -- Identity-based and self-certified key-exchange protocols -- Enabling technology for the trading of MPEG-encoded Video -- Image distribution method with embedded identifier scheme for copyright protection.
520 _aThis book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997. The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aOperating systems (Computers).
650 0 _aData encryption (Computer science).
650 0 _aManagement information systems.
650 0 _aComputer engineering.
650 0 _aElectrical engineering.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aComputer Engineering.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aOperating Systems.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCommunications Engineering, Networks.
700 1 _aVaradharajan, Vijay.
_eeditor.
700 1 _aPieprzyk, Josef.
_eeditor.
700 1 _aMu, Yi.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540632320
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1270
856 4 0 _uhttp://dx.doi.org/10.1007/BFb0027916
912 _aZDB-2-SCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _2ddc
_cEB
950 _aComputer Science (Springer-11645)
999 _c14337
_d14337