Information Security and Privacy 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings

Bibliographic Details
Other Authors: Dawson, Ed (Editor), Clark, Andrew (Editor), Boyd, Colin (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2000, 2000
Edition:1st ed. 2000
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • Key Recovery System for the Commercial Environment
  • A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication
  • Public Key Infrastructure
  • Key Management for Secure Multicast with Dynamic Controller
  • PKI Seeks a Trusting Relationship
  • The PKI Specification Dilemma: A Formal Solution
  • Boolean Functions
  • Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator
  • Security Weaknesses in a Randomized Stream Cipher
  • Two-Stage Optimisation in the Design of Boolean Functions
  • Intrusion Detection
  • A Novel Engine for Various Intrusion Detection Methods
  • Codes
  • Construction and Categories of Codes
  • Digital Signatures I
  • Cryptanalysis of Polynomial Authentication and Signature Scheme
  • Secure Transactions with Mobile Agents in Hostile Environments
  • A Multisignature Scheme with Message Flexibility, Order Flexibilityand Order Verifiability
  • Secret Sharing I
  • Light Weight Broadcast Exclusion Using Secret Sharing
  • Cheating Prevention in Secret Sharing
  • On Multiplicative Secret Sharing Schemes
  • Digital Signatures II
  • On the Security of the RSA-Based Multisignature Scheme for Various Group Structures
  • Fail-Stop Confirmer Signatures
  • An Extremely Small and Efficient Identification Scheme
  • Protocols
  • An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme
  • AKA Protocols for Mobile Communications
  • Electronic Commerce II
  • A Three Phased Schema for Sealed Bid Auction System Design
  • An Online Public Auction Protocol Protecting Bidder Privacy
  • Secret Sharing II
  • Algorithms to Speed Up Computations in Threshold RSA
  • Sharing Block Ciphers
  • Keynote Papers
  • All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce
  • Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society
  • Network Security I
  • Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System
  • Towards a New Authorisation Paradigm for Extranets
  • Custom Safety Policies in Safe Erlang
  • Public Key Cryptography
  • A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring
  • Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption
  • Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance
  • Network Security II
  • High Performance Agile Crypto Modules
  • A Three-Party HTTP Proxy to Support Internet Content Regulation
  • Cryptographic Implementation Issues
  • Cryptanalysis of the m – Permutation Protection Schemes
  • An Implementation of Bitsliced DES on the Pentium MMXTM Processor
  • Electronic Commerce I
  • Securing Large E-Commerce Networks
  • Passive Entities: A Strategy for Electronic Payment Design
  • Key Recovery