Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9--11, 2003. Proceedings (Q1414906)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9--11, 2003. Proceedings |
scientific article; zbMATH DE number 2014608
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9--11, 2003. Proceedings |
scientific article; zbMATH DE number 2014608 |
Statements
Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9--11, 2003. Proceedings (English)
0 references
8 December 2003
0 references
The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 0993.00040). Indexed articles: \textit{Bull, Laurence; Squire, David McG.; Newmarch, Jan; Zheng, Yuliang}, Grouping verifiable content for selective disclosure, 1-12 [Zbl 1044.94540] \textit{Kitazawa, Shigeki; Soshi, Masakazu; Miyaji, Atsuko}, Evaluation of anonymity of practical anonymous communication networks, 13-26 [Zbl 1042.68513] \textit{Persiano, Pino; Visconti, Ivan}, An anonymous credential system and a privacy-aware PKI, 27-38 [Zbl 1044.94544] \textit{Abe, Masayuki; Imai, Hideki}, Flaws in some robust optimistic mix-nets, 39-50 [Zbl 1044.94523] \textit{Odlyzko, Andrew}, The unsolvable privacy problem and its implications for security technologies, 51-54 [Zbl 1044.94500] \textit{Hitchcock, Yvonne; Montague, Paul; Carter, Gary; Dawson, Ed}, The security of fixed versus random elliptic curves in cryptography, 55-66 [Zbl 1044.94530] \textit{Han, Dong-Guk; Chang, Nam Su; Jung, Seok Won; Park, Young-Ho; Kim, Chang Han; Ryu, Heuisu}, Cryptanalysis of the full version randomized addition-subtraction chains, 67-78 [Zbl 1044.94529] \textit{Weimerskirch, André; Stebila, Douglas; Shantz, Sheueling Chang}, Generic \(\text{GF}(2^m)\) arithmetic in software and its application to ECC, 79-92 [Zbl 1042.12006] \textit{Arita, Seigo}, An addition algorithm in Jacobian of \(C_{34}\) curve, 93-105 [Zbl 1044.94524] \textit{Yen, Sung-Ming}, Amplified differential power cryptanalysis on Rijndael implementations with exponentially fewer power traces, 106-117 [Zbl 1044.94536] \textit{Chen, Chien-Ning; Yen, Sung-Ming}, Differential fault analysis on AES key schedule and some countermeasures, 118-129 [Zbl 1044.94525] \textit{Iwata, Tetsu; Yagi, Tohru; Kurosawa, Kaoru}, On the pseudorandomness of KASUMI type permutations, 130-141 [Zbl 1044.94531] \textit{Takenaka, Masahiko; Shimoyama, Takeshi; Koshiba, Takeshi}, Theoretical analysis of \(\chi^2\) attack on RC6, 142-153 [Zbl 1044.94534] \textit{Wang, Libin; Chen, Kefei}, A typed theory for access control and information flow control in mobile systems, 154-165 [Zbl 1042.68598] \textit{Tin, Yiu Shing Terry; Boyd, Colin; Nieto, Juan Manuel González}, Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach, 166-179 [Zbl 1044.94547] \textit{Gu, Jabeom; Park, Sehyun; Song, Ohyoung; Lee, Jaeil; Nah, Jaehoon; Sohn, Sungwon}, Mobile PKI: A PKI-based authentication framework for the next generation mobile communi\-cations, 180-191 [Zbl 1044.94542] \textit{Narayanan, Arvind; Rangan, C. Pandu; Kim, Kwangjo}, Practical pay TV schemes, 192-203 [Zbl 1044.94532] \textit{Song, Ha Yoon; Kim, Han-gyoo}, Cooperative routers against DoS attacks, 204-213 [Zbl 1042.68592] \textit{Peng, Tao; Leckie, Christopher; Ramamohanarao, Kotagiri}, Detecting distributed denial of service attacks by sharing distributed beliefs, 214-225 [Zbl 1042.68587] \textit{Singh, Abhishek; Nordström, Ola; Lu, Chenghuai; dos Santos, Andre L. M.}, Malicious ICMP tunneling: Defense against the vulnerability, 226-236 [Zbl 1042.68591] \textit{Canard, Sébastien; Traoré, Jacques}, On fair e-cash systems based on group signature schemes, 237-248 [Zbl 1044.94541] \textit{Pashalidis, Andreas; Mitchell, Chris J.}, A taxonomy of single sign-on systems, 249-264 [Zbl 1042.68586] \textit{Sung, Jaechul; Hong, Deukjo; Lee, Sangjin}, Key recovery attacks on the RMAC, TMAC, and IACBC, 265-273 [Zbl 1044.94546] \textit{Han, Daewan; Hong, Jin; Han, Jae Woo; Kwon, Daesung}, Key recovery attacks on NTRU without ciphertext validation routine, 274-284 [Zbl 1044.94528] \textit{Yen, Sung-Ming; Moon, SangJae; Ha, JaeCheol}, Permanent fault attack on the parameters of RSA with CRT, 285-296 [Zbl 1044.94537] \textit{Young, Adam; Yung, Moti}, Backdoor attacks on black-box ciphers exploiting low-entropy plaintexts, 297-311 [Zbl 1042.68600] \textit{Zhang, Fangguo; Kim, Kwangjo}, Efficient ID-based blind signature and proxy signature from bilinear pairings, 312-323 [Zbl 1044.94548] \textit{Hwang, Jung Yeon; Kim, Hyun-Jeong; Lee, Dong Hoon; Lim, JongIn}, Digital signature schemes with restriction on signing capability, 324-335 [Zbl 1044.94543] \textit{Kawauchi, Kei; Tada, Mitsuru}, On the exact security of multi-signature schemes based on RSA, 336-349 [Zbl 1045.94539] \textit{Damgård, Ivan; Jurik, Mads}, A length-flexible threshold cryptosystem with applications, 350-364 [Zbl 1045.94514] \textit{Hanaoka, Goichiro; Ogawa, Kazuto; Murota, Itsuro; Ohtake, Go; Majima, Keigo; Oyamada, Kimiyuki; Gohshi, Seiichi; Namba, Seiichi; Imai, Hideki}, Separating encryption and key issuance in digital rights management systems, 365-376 [Zbl 1042.68570] \textit{Hwang, Yong Ho; Kim, Chong Hee; Lee, Pil Joong}, An efficient revocation scheme with minimal message length for stateless receivers, 377-386 [Zbl 1042.68574] \textit{Pieprzyk, Josef; Pointcheval, David}, Parallel authentication and public-key encryption, 387-401 [Zbl 1045.94541] \textit{Gong, Li}, Is cross-platform security possible?, 402 [Zbl 1042.68734] \textit{Reid, Jason; Cheong, Ian; Henricksen, Matthew; Smith, Jason}, A novel use of RBAC to protect privacy in distributed health care information systems, 403-415 [Zbl 1042.68695] \textit{Bao, Feng}, Cryptanalysis of a new cellular automata cryptosystem, 416-427 [Zbl 1045.94511] \textit{Tan, Chik How; Yi, Xun; Siew, Chee Kheong}, A CCA2 secure key encapsulation scheme based on 3rd order shift registers, 428-442 [Zbl 1045.94533] \textit{Kanso, Ali}, Clock-controlled shrinking generator of feedback shift registers, 443-451 [Zbl 1045.94510] \textit{Hwang, Yong Ho; Yum, Dae Hyun; Lee, Pil Joong}, EPA: An efficient password-based protocol for authenticated key exchange, 452-463 [Zbl 1045.94538] \textit{Daza, Vanesa; Herranz, Javier; Sáez, Germán}, Constructing general dynamic group key distribution schemes with decentralized user join, 464-475 [Zbl 1045.94515] \textit{Kwon, Taekyoung}, Robust software tokens -- yet another method for securing user's digital identity, 476-487 [Zbl 1045.94540] \textit{Kim, Hwankoo; Moon, SangJae}, Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders, 488-497 [Zbl 1045.94526] \textit{Khoo, Khoongming; Gong, Guang}, New constructions for resilient and highly nonlinear Boolean functions, 498-509 [Zbl 1045.94525] \textit{Matsuo, Toshihiko; Kurosawa, Kaoru}, On parallel hash functions based on block-cipher, 510-521 [Zbl 1042.68584] \textit{Heng, Swee-Huay; Kurosawa, Kaoru}, Square hash with a small key size, 522-531 [Zbl 1042.68571]
0 references
Information security
0 references
Information privacy
0 references
ACISP 2003
0 references
Wollongong (Australia)
0 references