Information security and privacy. 4th Australian conference, ACISP '99. Wollongong, NSW, Australia, April 7--9, 1999. Proceedings (Q1284362)

From MaRDI portal





scientific article; zbMATH DE number 1278184
Language Label Description Also known as
English
Information security and privacy. 4th Australian conference, ACISP '99. Wollongong, NSW, Australia, April 7--9, 1999. Proceedings
scientific article; zbMATH DE number 1278184

    Statements

    Information security and privacy. 4th Australian conference, ACISP '99. Wollongong, NSW, Australia, April 7--9, 1999. Proceedings (English)
    0 references
    21 April 1999
    0 references
    The articles of mathematical interest will be reviewed individually. The preceding conference (3rd, 1998) has been announced (see Zbl 0892.00054). Indexed articles: \textit{Millan, William; Clark, Andrew; Dawson, Ed}, Boolean function design using hill climbing methods, 1-11 [Zbl 0919.94018] \textit{Maitra, Subhamoy; Sarkar, Palash}, Enumeration of correlation immune Boolean functions, 12-25 [Zbl 0919.94016] \textit{Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef}, On the symmetric property of homogeneous Boolean functions, 26-35 [Zbl 0919.94019] \textit{Viswanathan, Kapali; Boyd, Colin; Dawson, Ed}, Publicly verifiable key escrow with limited time span, 36-50 [Zbl 0919.94047] \textit{Lee, Seungwon; Hong, Seong-Min; Yoon, Hyunsoo; Cho, Yookun}, Accelerating key establishment protocols for mobile communication, 51-63 [Zbl 0919.94038] \textit{Li, Chih-Hung; Pieprzyk, Josef}, Conference key agreement from secret sharing, 64-76 [Zbl 0919.94040] \textit{Fung, W. W.; Gray, J. W. III}, On \(m\)-permutation protection scheme against modification attack, 77-87 [Zbl 0919.94034] \textit{Golić, Jovan Dj.; Clark, Andrew; Dawson, Ed}, Inversion attack and branching, 88-102 [Zbl 0919.94036] \textit{Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef}, Fail-stop threshold signature schemes based on elliptic curves, 103-116 [Zbl 0919.94045] \textit{Nguyen, Khanh Quoc; Mu, Yi; Varadharajan, Vijay}, Divertible zero-knowledge proof of polynomial relations and blind group signature, 117-128 [Zbl 0919.94043] \textit{Ghodosi, Hossein; Pieprzyk, Josef}, Repudiation of cheating and non-repudiation of Zhang's proxy signature schemes, 129-134 [Zbl 0919.94035] \textit{Müller, Siguna}, On the security of an RSA based encryption scheme, 135-148 [Zbl 0919.94042] \textit{Gysin, Marc; Seberry, Jennifer}, Generalised cycling attacks on RSA and strong RSA primes, 149-163 [Zbl 0919.94037] \textit{Tiountchik, Alexander; Trichina, Elena}, RSA acceleration with field programmable gate arrays, 164-176 [Zbl 0919.94046] \textit{Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong}, Changing thresholds in the absence of secure channels, 177-191 [Zbl 0919.94041] \textit{Saeednia, Shahrokh; Ghodosi, Hossein}, A self-certified group-oriented cryptosystem without a combiner, 192-201 [Zbl 0919.94044] \textit{Horton, Jeffrey; Seberry, Jennifer}, Companion viruses and the Macintosh: Threats and countermeasures, 202-212 [Zbl 1038.68554] \textit{Ashley, Paul; Broom, Bradley; Vandenwauver, Mark}, An implementation of a secure version of NFS including RBAC, 213-227 [Zbl 0924.68075] \textit{Traoré, Jacques}, Group signatures and their relevance to privacy-protecting off-line eletronic cash systems, 228-243 [Zbl 0924.68076] \textit{Boyd, Colin; Foo, Ernest; Pavlovski, Chris}, Efficient electronic cash using batch signatures, 244-257 [Zbl 0924.68077] \textit{Zhou, Jianying; Deng, Robert; Bao, Feng}, Evolution of fair non-repudiation with TTP, 258-269 [Zbl 0924.68078] \textit{Bai, Yun; Varadharajan, Vijay}, Authorization in object oriented databases, 270-280 [Zbl 0924.68065] \textit{Saunders, Gregory; Hitchens, Michael; Varadharajan, Vijay}, An analysis of access control models, 281-293 [Zbl 0924.68079] \textit{Lenstra, Arjen K.}, Efficient identity based parameter selection for elliptic curve cryptosystems, 294-302 [Zbl 0919.94039] \textit{Pei, Dingyi; Li, Yuqiang; Wang, Yejing; Safavi-Naini, Rei}, Characterization of optimal authentication codes with arbitration, 303-313 [Zbl 1031.94014] \textit{Yamamura, Akihiro}, A functional cryptosystem using a group action, 314-325 [Zbl 0919.94048]
    0 references
    Wollongong, NSW (Australia)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    ACISP '99
    0 references
    Information security
    0 references
    Privacy
    0 references

    Identifiers