Information Security and Privacy
13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Herausgegeben:Mu, Yi; Susilo, Willy; Seberry, Jennifer
Information Security and Privacy
13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Herausgegeben:Mu, Yi; Susilo, Willy; Seberry, Jennifer
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.
The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
- Josef Pieprzyk (Volume ed.) / Hossein Ghodosi / Ed DawsonInformation Security and Privacy37,99 €
- Phong Q. Nguyen (ed.)Progress in Cryptology - VIETCRYPT 200642,99 €
- Colin Boyd / Juan M. González Nieto (eds.)Information Security and Privacy42,99 €
- Lynn Batten / Reihaneh Safavi-Naini (eds.)Information Security and Privacy42,99 €
- Kaoru Kurosawa (Volume ed.)Advances in Cryptology - ASIACRYPT 200774,99 €
- Tal Malkin (Volume ed.)Topics in Cryptology - CT-RSA 200837,99 €
- Dipanwita Roy Chowdhury (ed.) Rijmen . Vincent / Abhijit Das (Volume editor)Progress in Cryptology - INDOCRYPT 200837,99 €
-
-
-
The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
- Produktdetails
- Lecture Notes in Computer Science 5107
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12322725, 978-3-540-69971-2
- 2008
- Seitenzahl: 496
- Erscheinungstermin: 24. Juni 2008
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 753g
- ISBN-13: 9783540699712
- ISBN-10: 3540699716
- Artikelnr.: 24382956
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 5107
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12322725, 978-3-540-69971-2
- 2008
- Seitenzahl: 496
- Erscheinungstermin: 24. Juni 2008
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 753g
- ISBN-13: 9783540699712
- ISBN-10: 3540699716
- Artikelnr.: 24382956
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Enforcing User
Aware Browser
Based Mutual Authentication with Strong Locked Same Origin Policy.
Secure Biometric Authentication with Improved Accuracy.
A Critical Analysis and Improvement of AACS Drive
Host Authentication.
Comparing the Pre
and Post
specified Peer Models for Key Agreement.
Efficient One
Round Key Exchange in the Standard Model.
On the Improvement of the BDF Attack on LSBS
RSA.
Public
Key Cryptosystems with Primitive Power Roots of Unity.
Relationship between Two Approaches for Defining the Standard Model PA
ness.
Distributed Verification of Mixing
Local Forking Proofs Model.
Fully
Simulatable Oblivious Set Transfer.
Efficient Disjointness Tests for Private Datasets.
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
Multidimensional Linear Cryptanalysis of Reduced Round Serpent.
Cryptanalysis of Reduced
Round SMS4 Block Cipher.
On the Unprovable Security of 2
Key XCBC.
Looking Back at a New Hash Function.
Non
linear Reduced Round Attacks against SHA
2 Hash Family.
Collisions for Round
Reduced LAKE.
Preimage Attacks on Step
Reduced MD5.
Linear Distinguishing Attack on Shannon.
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck.
Related
Key Chosen IV Attacks on Grain
v1 and Grain
128.
Signature Generation and Detection of Malware Families.
Reducing Payload Scans for Attack Signature Matching Using Rule Classification.
Implicit Detection of Hidden Processes with a Feather
Weight Hardware
Assisted Virtual Machine Monitor.
FormatShield: A Binary Rewriting Defense against Format String Attacks.
Advanced Permission
Role Relationship in Role
Based Access Control.
Enhancing Micro
Aggregation Technique by Utilizing Dependence
Based Information in Secure Statistical Databases.
Montgomery Residue Representation Fault
Tolerant Computation in GF(2 k ).
A Tree
Based Approach for Computing Double
Base Chains.
Extractors for Jacobians of Binary Genus
2 Hyperelliptic Curves.
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.
Enforcing User
Aware Browser
Based Mutual Authentication with Strong Locked Same Origin Policy.
Secure Biometric Authentication with Improved Accuracy.
A Critical Analysis and Improvement of AACS Drive
Host Authentication.
Comparing the Pre
and Post
specified Peer Models for Key Agreement.
Efficient One
Round Key Exchange in the Standard Model.
On the Improvement of the BDF Attack on LSBS
RSA.
Public
Key Cryptosystems with Primitive Power Roots of Unity.
Relationship between Two Approaches for Defining the Standard Model PA
ness.
Distributed Verification of Mixing
Local Forking Proofs Model.
Fully
Simulatable Oblivious Set Transfer.
Efficient Disjointness Tests for Private Datasets.
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
Multidimensional Linear Cryptanalysis of Reduced Round Serpent.
Cryptanalysis of Reduced
Round SMS4 Block Cipher.
On the Unprovable Security of 2
Key XCBC.
Looking Back at a New Hash Function.
Non
linear Reduced Round Attacks against SHA
2 Hash Family.
Collisions for Round
Reduced LAKE.
Preimage Attacks on Step
Reduced MD5.
Linear Distinguishing Attack on Shannon.
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck.
Related
Key Chosen IV Attacks on Grain
v1 and Grain
128.
Signature Generation and Detection of Malware Families.
Reducing Payload Scans for Attack Signature Matching Using Rule Classification.
Implicit Detection of Hidden Processes with a Feather
Weight Hardware
Assisted Virtual Machine Monitor.
FormatShield: A Binary Rewriting Defense against Format String Attacks.
Advanced Permission
Role Relationship in Role
Based Access Control.
Enhancing Micro
Aggregation Technique by Utilizing Dependence
Based Information in Secure Statistical Databases.
Montgomery Residue Representation Fault
Tolerant Computation in GF(2 k ).
A Tree
Based Approach for Computing Double
Base Chains.
Extractors for Jacobians of Binary Genus
2 Hyperelliptic Curves.
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.