000 04165nam a22006495i 4500
001 978-3-540-48970-2
003 DE-He213
005 20240423132509.0
007 cr nn 008mamaa
008 121227s1999 gw | s |||| 0|eng d
020 _a9783540489702
_9978-3-540-48970-2
024 7 _a10.1007/3-540-48970-3
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aInformation Security and Privacy
_h[electronic resource] :
_b4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings /
_cedited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry.
250 _a1st ed. 1999.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c1999.
300 _aXII, 332 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1587
505 0 _aBoolean Functions -- Boolean Function Design Using Hill Climbing Methods -- Enumeration of Correlation Immune Boolean Functions -- On the Symmetric Property of Homogeneous Boolean Functions -- Key Management -- Publicly Verifiable Key Escrow with Limited Time Span -- Accelerating Key Establishment Protocols for Mobile Communication -- Conference Key Agreement from Secret Sharing -- Cryptanalysis -- On m-Permutation Protection Scheme against Modification Attack -- Inversion Attack and Branching -- Signatures -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature -- Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes -- RSA Cryptosystems -- On the Security of an RSA Based Encryption Scheme -- Generalised Cycling Attacks on RSA and Strong RSA Primes -- RSA Acceleration with Field Programmable Gate Arrays -- Group Cryptography -- Changing Thresholds in the Absence of Secure Channels -- A Self-Certified Group-Oriented Cryptosystem without a Combiner -- Network Security -- Companion Viruses and the Macintosh: Threats and Countermeasures -- An Implementation of a Secure Version of NFS Including RBAC -- Electronic Commerce -- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems -- Effient Electronic Cash Using Batch Signatures -- Evolution of Fair Non-repudiation with TTP -- Access Control -- Authorization in Object Oriented Databases -- An Analysis of Access Control Models -- Odds and Ends -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems -- Characterization of Optimal Authentication Codes with Arbitration -- A Functional Cryptosystem Using a Group Action.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData protection.
650 0 _aOperating systems (Computers).
650 0 _aAlgorithms.
650 0 _aComputer networks .
650 1 4 _aCryptology.
650 2 4 _aData and Information Security.
650 2 4 _aOperating Systems.
650 2 4 _aAlgorithms.
650 2 4 _aComputer Communication Networks.
700 1 _aPieprzyk, Josef.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSafavi-Naini, Rei.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSeberry, Jennifer.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540657569
776 0 8 _iPrinted edition:
_z9783662183700
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1587
856 4 0 _uhttps://doi.org/10.1007/3-540-48970-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188404
_d188404