Information Security and Privacy: Third Australasian Conference, ACISP’98 Brisbane, Australia, July 13–15, 1998 Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 1438

ISBN: 3540647325, 9783540647324

Size: 3 MB (2964378 bytes)

Pages: 432/430

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Per Kaijser (auth.), Colin Boyd, Ed Dawson (eds.)3540647325, 9783540647324

This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP’98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.

Table of contents :
A review of the SESAME development….Pages 1-8
The security of public key cryptosystems based on integer factorization….Pages 9-23
A uniform approach to securing Unix applications using SESAME….Pages 24-35
Integrated management of network and host based security mechanisms….Pages 36-47
Covert distributed computing using Java through Web Spoofing….Pages 48-57
Differential cryptanalysis of a block cipher….Pages 58-67
On private-key cryptosystems based on product codes….Pages 68-79
Key schedules of iterative block ciphers….Pages 80-89
Low-cost secure server connection with limited-privilege clients….Pages 90-98
A solution to open standard of PKI….Pages 99-110
Comparison of commitment schemes used in mix-mediated anonymous communication for preventing pool-mode attacks….Pages 111-122
Correlation attacks on up/down cascades….Pages 123-134
A stream cipher based on linear feedback over GF(2 8 )….Pages 135-146
A probabilistic correlation attack on the shrinking generator….Pages 147-158
Bounds and constructions for A 3 -code with multi-senders….Pages 159-168
Rotation-symmetric functions and fast hashing….Pages 169-180
How to improve the nonlinearity of bijective S-boxes….Pages 181-192
Object modeling of cryptographic algorithms with UML….Pages 193-204
Adapting an electronic purse for internet payments….Pages 205-214
LITESET: A light-weight secure electronic transaction protocol….Pages 215-226
Applications of linearised and sub-linearised polynomials to information security….Pages 227-237
Protocol failures related to order of encryption and signature computation of discrete logarithms in RSA groups….Pages 238-249
Protection against EEPROM modification attacks….Pages 250-260
Trends in quantum cryptography in Czech Republic….Pages 261-272
A high level language for conventional access control models….Pages 273-283
Fast access control decisions from delegation certificate databases….Pages 284-295
Meta objects for access control: Role-based principals….Pages 296-307
A dynamically typed access control model….Pages 308-319
Efficient identity-based conference key distribution protocols….Pages 320-331
A formal model for systematic design of key establishment protocols….Pages 332-343
Key establishment protocols for secure mobile communications: A selective survey….Pages 344-355
Detecting key-dependencies….Pages 356-366
Secret sharing in multilevel and compartmented groups….Pages 367-378
On construction of cumulative secret sharing schemes….Pages 379-390
A comment on the efficiency of secret sharing scheme over any finite abelian group….Pages 391-402
A user identification system using signature written with mouse….Pages 403-414
On Zhang’s nonrepudiable proxy signature schemes….Pages 415-422

Reviews

There are no reviews yet.

Be the first to review “Information Security and Privacy: Third Australasian Conference, ACISP’98 Brisbane, Australia, July 13–15, 1998 Proceedings”
Shopping Cart
Scroll to Top