The 2009 Australasian Conference on Information Security and Privacy was the 14th in an annual series that started in 1996. Over the years ACISP has grown froma relativelysmall conferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2009 was held at Queensland University of Technology in Brisbane, d- ing July 1-3, 2009. This year there were 106 paper submissions and from those 30 papers were accepted for presentation, but one was subsequently withdrawn. Authors of - cepted papers came from 17 countries and 4…mehr
The 2009 Australasian Conference on Information Security and Privacy was the 14th in an annual series that started in 1996. Over the years ACISP has grown froma relativelysmall conferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2009 was held at Queensland University of Technology in Brisbane, d- ing July 1-3, 2009. This year there were 106 paper submissions and from those 30 papers were accepted for presentation, but one was subsequently withdrawn. Authors of - cepted papers came from 17 countries and 4 continents, illustrating the inter- tional ?avorof ACISP. We would like to extend our sincere thanks to all authors who submitted papers to ACISP 2009. The contributed papers were supplemented by two invited talks from e- nent researchers in information security. Basie von Solms (University of Joh- nesburg), currently President of IFIP, raised the question of how well dressed is the informationsecurity king. L. Jean Camp (Indiana University) talked about how to harden the network from the friend within. We are grateful to both of them for sharing their extensive knowledge and setting challenging questions for the ACISP 2009 delegates. We were fortunate to have an energetic team of experts who formed the Program Committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewedpapers in their particularareasof expertise.
Artikelnr. des Verlages: 12707515, 978-3-642-02619-5
2009
Seitenzahl: 484
Erscheinungstermin: 15. Juni 2009
Englisch
Abmessung: 235mm x 155mm x 27mm
Gewicht: 727g
ISBN-13: 9783642026195
ISBN-10: 3642026192
Artikelnr.: 26538592
Herstellerkennzeichnung
Books on Demand GmbH
In de Tarpen 42
22848 Norderstedt
info@bod.de
040 53433511
Inhaltsangabe
Invited Lecture.- Is the Information Security King Naked?.- Network Security.- Measurement Study on Malicious Web Servers in the .nz Domain.- A Combinatorial Approach for an Anonymity Metric.- On Improving the Accuracy and Performance of Content-Based File Type Identification.- Symmetric Key Encryption.- Attacking 9 and 10 Rounds of AES-256.- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure.- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT.- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher.- Testing Stream Ciphers by Finding the Longest Substring of a Given Density.- New Correlations of RC4 PRGA Using Nonzero-Bit Differences.- Hash Functions.- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security.- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.- Inside the Hypercube.- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.- On the Weak Ideal Compression Functions.- Invited Lecture.- Hardening the Network from the Friend Within.- Public Key Cryptography.- Reducing the Complexity in the Distributed Computation of Private RSA Keys.- Efficiency Bounds for Adversary Constructions in Black-Box Reductions.- Building Key-Private Public-Key Encryption Schemes.- Multi-recipient Public-Key Encryption from Simulators in Security Proofs.- Fair Threshold Decryption with Semi-Trusted Third Parties.- Conditional Proxy Broadcast Re-Encryption.- Security on Hybrid Encryption with the Tag-KEM/DEM Framework.- Protocols.- A Highly Scalable RFID Authentication Protocol.- Strengthening the Securityof Distributed Oblivious Transfer.- Towards Denial-of-Service-Resilient Key Agreement Protocols.- A Commitment-Consistent Proof of a Shuffle.- Implementation.- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography.- Random Order m-ary Exponentiation.- Jacobi Quartic Curves Revisited.
Invited Lecture.- Is the Information Security King Naked?.- Network Security.- Measurement Study on Malicious Web Servers in the .nz Domain.- A Combinatorial Approach for an Anonymity Metric.- On Improving the Accuracy and Performance of Content-Based File Type Identification.- Symmetric Key Encryption.- Attacking 9 and 10 Rounds of AES-256.- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure.- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT.- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher.- Testing Stream Ciphers by Finding the Longest Substring of a Given Density.- New Correlations of RC4 PRGA Using Nonzero-Bit Differences.- Hash Functions.- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security.- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.- Inside the Hypercube.- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.- On the Weak Ideal Compression Functions.- Invited Lecture.- Hardening the Network from the Friend Within.- Public Key Cryptography.- Reducing the Complexity in the Distributed Computation of Private RSA Keys.- Efficiency Bounds for Adversary Constructions in Black-Box Reductions.- Building Key-Private Public-Key Encryption Schemes.- Multi-recipient Public-Key Encryption from Simulators in Security Proofs.- Fair Threshold Decryption with Semi-Trusted Third Parties.- Conditional Proxy Broadcast Re-Encryption.- Security on Hybrid Encryption with the Tag-KEM/DEM Framework.- Protocols.- A Highly Scalable RFID Authentication Protocol.- Strengthening the Securityof Distributed Oblivious Transfer.- Towards Denial-of-Service-Resilient Key Agreement Protocols.- A Commitment-Consistent Proof of a Shuffle.- Implementation.- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography.- Random Order m-ary Exponentiation.- Jacobi Quartic Curves Revisited.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826