Information security and privacy. 3rd Australasian conference, ACISP '98, Brisbane, Australia, July 13--15, 1998. Proceedings (Q1389908)

From MaRDI portal





scientific article; zbMATH DE number 1173961
Language Label Description Also known as
English
Information security and privacy. 3rd Australasian conference, ACISP '98, Brisbane, Australia, July 13--15, 1998. Proceedings
scientific article; zbMATH DE number 1173961

    Statements

    Information security and privacy. 3rd Australasian conference, ACISP '98, Brisbane, Australia, July 13--15, 1998. Proceedings (English)
    0 references
    13 July 1998
    0 references
    The articles of this volume will be reviewed individually. The preceding conference (2nd, 1997) has been reviewed (see Zbl 0868.00070). Indexed articles: \textit{Kaijser, Per}, A review of the SESAME development, 1-8 [Zbl 0901.68050] \textit{Müller, Siguna; Müller, Winfried B.}, The security of public key cryptosystems based on integer factorization., 9-23 [Zbl 1097.94513] \textit{Ashley, Paul; Vandenwauver, Mark; Broom, Bradley}, A uniform approach to securing Unix applications using SESAME, 24-35 [Zbl 0902.68051] \textit{Falk, Rainer; Trommer, Markus}, Integrated management of network and host based security mechanisms, 36-47 [Zbl 0901.68011] \textit{Horton, Jeffrey; Seberry, Jennifer}, Covert distributed computing using Java through web spoofing, 48-57 [Zbl 0902.68052] \textit{Yi, Xun; Lam, Kwok Yan; Han, Yongfei}, Differential cryptanalysis of a block cipher., 58-67 [Zbl 1097.94522] \textit{Sun, Hung-Min; Shieh, Shiuh-Pyng}, On private-key cryptosystems based on product codes., 68-79 [Zbl 1097.94520] \textit{Carter, G.; Dawson, E.; Nielsen, L.}, Key schedules of iterative block ciphers., 80-89 [Zbl 1097.94508] \textit{Blumenthal, Uri; Hien, N. C.; Ronney, J. H.}, Low-cost secure server connection with limited-privilege clients, 90-98 [Zbl 0901.68012] \textit{He, Qi; Sycara, Katia; Su, Zhongmin}, A solution to open standard of PKI, 99-110 [Zbl 0902.68053] \textit{Franz, E.; Graubner, A.; Jerichow, A.; Pfitzmann, A.}, Comparison of commitment schemes used in mix-mediated anonymous communication for preventing pool-mode attacks, 111-122 [Zbl 0902.68054] \textit{Golić, Jovan Dj.; Menicocci, Renato}, Correlation attacks on up/down cascades., 123-134 [Zbl 1097.94507] \textit{Rose, Greg}, A stream cipher based on linear feedback over GF\((2^8)\)., 135-146 [Zbl 1097.94515] \textit{Simpson, L.; Golić, J. Dj; Dawson, E.}, A probabilistic correlation attack on the shrinking generator, 147-158 [Zbl 0931.94039] \textit{Safavi-Naini, Rei; Wang, Yejing}, Bounds and constructions for \(A^3\)-code with multi-senders., 159-168 [Zbl 1097.94518] \textit{Pieprzyk, Josef; Qu, Cheng Xin}, Rotation-symmetric functions and fast hashing., 169-180 [Zbl 1097.94514] \textit{Millan, William}, How to improve the nonlinearity of bijective S-boxes., 181-192 [Zbl 1097.94512] \textit{Kaksonen, Rauli; Mähönen, Petri}, Object modeling of cryptographic algorithms with UML, 193-204 [Zbl 0902.68055] \textit{Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki}, LITESET: A light-weight secure electronic transaction protocol, 215-226 [Zbl 0902.68056] \textit{Henderson, Marie}, Applications of linearised and sub-linearised polynomials to information security., 227-237 [Zbl 1097.94511] \textit{Chen, Mark; Hughes, Eric}, Protocol failures related to order of encryption and signature. Computation of discrete logarithms in RSA groups., 238-249 [Zbl 1097.94509] \textit{Fung, W. W.; Gray, J. W. III}, Protection against EEPROM modification attacks, 250-260 [Zbl 0902.68057] \textit{Hruby, Jaroslav}, Trends in quantum cryptography in Czech Republic, 261-272 [Zbl 0961.81512] \textit{Bai, Yun; Varadharajan, Vijay}, A high level language for conventional access control models, 273-283 [Zbl 0908.68054] \textit{Aura, Tuomas}, Fast access control decisions from delegation certificate databases, 282-295 [Zbl 0902.68058] \textit{Riechmann, Thomas; Kleinöder, Jürgen}, Meta objects for access control: Role-based principals, 296-307 [Zbl 0902.68059] \textit{Tidswell, Jonathon E.; Potter, John M.}, A dynamically typed access control model, 308-319 [Zbl 0901.68051] \textit{Saeednia, Shahrokh; Safavi-Naini, Rei}, Efficient identity-based conference key distribution protocols., 320-331 [Zbl 1097.94517] \textit{Rudolph, Carsten}, A formal model for systematic design of key establishment protocols., 332-343 [Zbl 1097.94516] \textit{Boyd, Colin; Mathuria, Anish}, Key establishment protocols for secure mobile communications: A selective survey, 344-355 [Zbl 0931.94052] \textit{Stabell-Kulø, Tage; Helme, Arne; Dini, Gianluca}, Detecting key-dependencies., 356-366 [Zbl 1097.94519] \textit{Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei}, Secret sharing in multilevel and compartmented groups, 367-378 [Zbl 0931.94022] \textit{Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong}, On construction of cumulative secret sharing schemes, 379-390 [Zbl 0931.94023] \textit{Desmedt, Yvo; King, Brian; Kishimoto, Wataru; Kurosawa, Kaoru}, A comment on the efficiency of secret sharing scheme over any finite abelian group., 391-402 [Zbl 1097.94510] \textit{Syukri, Agus Fanar; Okamoto, Eiji; Mambo, Masahiro}, A user identification system using signature written with mouse, 403-414 [Zbl 0908.68055] \textit{Lee, Narn-Yih; Hwang, Tzonelih; Wang, Chih-Hung}, On Zhang's nonrepudiable proxy signature schemes, 415-422 [Zbl 0931.94033]
    0 references
    Brisbane (Australia)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    ACISP '98
    0 references
    Information security
    0 references
    Privacy
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references