Adrian Spalka, Armin B. Cremers, Hartmut Lehmler (auth.), E. P. Dawson, A. Clark, Colin Boyd (eds.)3540677429, 9783540677420
The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.
Table of contents :
Front Matter….Pages –
Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System….Pages 1-17
Towards a New Authorisation Paradigm for Extranets….Pages 18-29
Custom Safety Policies in Safe Erlang….Pages 30-40
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring….Pages 41-48
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption….Pages 49-58
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance….Pages 59-73
High Performance Agile Crypto Modules….Pages 74-88
A Three-Party HTTP Proxy to Support Internet Content Regulation….Pages 89-96
Cryptanalysis of the m – Permutation Protection Schemes….Pages 97-111
An Implementation of Bitsliced DES on the Pentium MMX TM Processor….Pages 112-122
Securing Large E-Commerce Networks….Pages 123-133
Passive Entities: A Strategy for Electronic Payment Design….Pages 134-148
Key Recovery System for the Commercial Environment….Pages 149-162
A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication….Pages 163-177
Key Management for Secure Multicast with Dynamic Controller….Pages 178-190
PKI Seeks a Trusting Relationship….Pages 191-205
The PKI Specification Dilemma: A Formal Solution….Pages 206-219
Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator….Pages 220-233
Security Weaknesses in a Randomized Stream Cipher….Pages 234-241
Two-Stage Optimisation in the Design of Boolean Functions….Pages 242-254
A Novel Engine for Various Intrusion Detection Methods….Pages 255-265
Construction and Categories of Codes….Pages 266-277
Cryptanalysis of Polynomial Authentication and Signature Scheme….Pages 278-288
Secure Transactions with Mobile Agents in Hostile Environments….Pages 289-297
A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability….Pages 298-312
Light Weight Broadcast Exclusion Using Secret Sharing….Pages 313-327
Cheating Prevention in Secret Sharing….Pages 328-341
On Multiplicative Secret Sharing Schemes….Pages 342-351
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures….Pages 352-367
Fail-Stop Confirmer Signatures….Pages 368-377
An Extremely Small and Efficient Identification Scheme….Pages 378-384
An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme….Pages 385-399
AKA Protocols for Mobile Communications….Pages 400-411
A Three Phased Schema for Sealed Bid Auction System Design….Pages 412-426
An Online Public Auction Protocol Protecting Bidder Privacy….Pages 427-442
Algorithms to Speed Up Computations in Threshold RSA….Pages 443-456
Sharing Block Ciphers….Pages 457-470
All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce….Pages 471-476
Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society….Pages 477-486
Back Matter….Pages –
Reviews
There are no reviews yet.