Steve Orlowski (auth.), Josef Pieprzyk, Jennifer Seberry (eds.)3540619917, 9783540619918
The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.
Table of contents :
The changing face of information technology security….Pages 1-13
Replicating the Kuperee authentication server for increased security and reliability….Pages 14-26
Non-repudiation without public-key….Pages 27-37
Investigation of non-repudiation protocols….Pages 38-47
A dynamic secret sharing scheme with cheater detection….Pages 48-55
A nonlinear secret sharing scheme….Pages 56-66
The access structure of some secret-sharing schemes….Pages 67-78
On construction of resilient functions….Pages 79-86
Another approach to software key escrow encryption….Pages 87-95
Cryptography based on transcendental numbers….Pages 96-107
Breakthroughs in standardisation of IT security criteria….Pages 108-120
Tailoring authentication protocols to match underlying mechanisms….Pages 121-133
On the design of security protocols for mobile communications….Pages 134-145
A framework for design of key establishment protocols….Pages 146-157
On period of multiplexed sequences….Pages 158-168
Edit distance correlation attacks on clock-controlled combiners with memory….Pages 169-181
A faster cryptanalysis of the self-shrinking generator….Pages 182-189
Modeling a multi-level secure object-oriented database using views….Pages 190-206
Support for joint action based security policies….Pages 207-218
Access control: The neglected frontier….Pages 219-227
On the quantitative assessment of behavioural security….Pages 228-241
On the modelling of preventive security based on a PC network intrusion experiment….Pages 242-252
Evidential reasoning in network intrusion detection systems….Pages 253-265
A group-oriented ( t, n ) undeniable signature scheme without trusted center….Pages 266-274
Cryptosystems for hierarchical groups….Pages 275-286
On selectable collisionful hash functions….Pages 287-298
On password-based authenticated key exchange using collisionful hash functions….Pages 299-310
A new universal test for bit strings….Pages 311-319
An alternative model of quantum key agreement via photon coupling….Pages 320-331
Reviews
There are no reviews yet.