Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10--12, 2000. Proceedings (Q1572701)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10--12, 2000. Proceedings |
scientific article; zbMATH DE number 1481734
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10--12, 2000. Proceedings |
scientific article; zbMATH DE number 1481734 |
Statements
Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10--12, 2000. Proceedings (English)
0 references
26 July 2000
0 references
The articles of this volume will be reviewed individually. The preceding conference (4th, 1999) has been indicated (see Zbl 0911.00058). Indexed articles: \textit{Spalka, Adrian; Cremers, Armin B.; Lehmler, Hartmut}, Protecting confidentiality against Trojan Horse programs in discretionary access control system, 1-17 [Zbl 0963.68545] \textit{Au, Richard; Looi, Mark; Ashley, Paul}, Towards a new authorisation paradigm for extranets, 18-29 [Zbl 0963.68627] \textit{Brown, Lawrie}, Custom safety policies in Safe Erlang, 30-40 [Zbl 0963.68599] \textit{Yoo, Heajoung; Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Yi, Okyeon; Sung, Maenghee}, A proposal of a new public key cryptosystem using matrices over a ring, 41-48 [Zbl 0963.94014] \textit{Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo}, Secure length-saving ElGamal encryption under the computational Diffie-Hellman assumption, 49-58 [Zbl 0963.94018] \textit{Sakai, Yasuyuki; Sakurai, Kouichi}, Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance, 59-73 [Zbl 0963.94017] \textit{Gamage, Chandana G.; Leiwo, Jussipekka; Zheng, Yuliang}, High performance agile crypto modules, 74-88 [Zbl 0963.68606] \textit{Prasetijo, Agung; Ashley, Paul; Looi, Mark; Clark, Andrew; Gaskell, Gary}, A three-party HTTP proxy to support internet content regulation, 89-96 [Zbl 0963.68593] \textit{Wu, Hongjun; Bao, Feng; Ye, Dingfeng; Deng, Robert H.}, Cryptanalysis of the \(m\)-permutation protection schemes, 97-111 [Zbl 0963.94015] \textit{May, Lauren; Penna, Lyta; Clark, Andrew}, An implementation of bitsliced DES on the Pentium \(\text{MMX}^{\text{TM}}\) processor, 112-122 [Zbl 0963.94502] \textit{Sklavos, Panagiotis; Varvitsiotis, Aggelos; Polemi, Despina}, Securing large E-commerce networks, 123-133 [Zbl 0963.68621] \textit{Foo, Ernest; Boyd, Colin}, Passive entities: A strategy for electronic payment design, 134-148 [Zbl 0963.68617] \textit{González Nieto, Juanma; Viswanathan, Kapali; Boyd, Colin; Dawson, Ed}, Key recovery system for the commercial environment, 149-162 [Zbl 0963.68220] \textit{Abe, Masayuki; Kanda, Masayuki}, A key escrow scheme with time-limited monitoring for one-way communication, 163-177 [Zbl 0963.94501] \textit{Kurnio, Hartono; Safavi-Naini, Rai; Susilo, Willy; Wang, Huaxiong}, Key management for secure multicast with dynamic controller, 178-190 [Zbl 0963.94504] \textit{Jøsang, Audun; Pedersen, Ingar Glenn; Povey, Dean}, PKI seeks a trusting relationship, 191-205 [Zbl 0963.94505] \textit{Ozols, Maris A.; Henderson, Marie; Liu, Chuchang; Cant, Tony}, The PKI specification dilemma: A formal solution, 206-219 [Zbl 0963.94507] \textit{Golić, Jovan Dj.}, Iterative probabilistic cryptanalysis of RC4 keystream generator, 220-233 [Zbl 0963.94503] \textit{Ferguson, Niels; Schneider, Bruce; Wagner, David}, Security weaknesses in a randomized stream cipher, 234-241 [Zbl 0963.94506] \textit{Clark, John A.; Jacob, Jeremy L.}, Two-stage optimisation in the design of Boolean functions, 242-254 [Zbl 0963.94508] \textit{Hui, Zhu; Tan, T. H. Daniel}, A novel engine for various intrusion detection methods, 255-265 [Zbl 0963.68592] \textit{Blakley, G. R.; Borosh, I.; Klappenecker, A.}, Construction and categories of codes, 266-277 [Zbl 0963.94002] \textit{Wu, Hongjun; Bao, Feng; Ye, Dingfeng; Deng, Robert H.}, Cryptanalysis of polynomial authentication and signature scheme, 278-288 [Zbl 0963.94514] \textit{Kotzanikolaou, Panayiotis; Burmester, Mike; Chrissikopoulos, Vassilios}, Secure transactions with mobile agents in hostile environments, 289-297 [Zbl 0963.68620] \textit{Mitomi, Shirow; Miyaji, Atsuko}, A multisignature scheme with message flexibility, order flexibility and order verifiability, 298-312 [Zbl 0963.94517] \textit{Matsuzaki, Natsume; Anzai, Jun; Matsumoto, Tsutomu}, Light weight broadcast exclusion using secret sharing, 313-327 [Zbl 0963.94516] \textit{Ghodosi, Hossein; Pieprzyk, Josef}, Cheating prevention in secret sharing, 328-341 [Zbl 0963.94513] \textit{Wang, Huaxiong; Lam, Kwok Yan; Xiao, Guo-Zhen; Zhao, Huanhui}, On multiplicative secrete sharing schemes, 342-351 [Zbl 0963.94030] \textit{Doi, Hiroshi; Mambo, Masahiro; Okamoto, Eiji}, On the security of the RSA-based multisignature scheme for various group structures, 352-367 [Zbl 0963.94518] \textit{Mu, Yi; Varadharajan, Vijay}, Fail-stop confirmer signatures, 368-377 [Zbl 0963.94515] \textit{Banks, William D.; Lieman, Daniel; Shparlinski, Igor E.}, An extremely small and efficient identification scheme, 378-384 [Zbl 0963.94511] \textit{Sakurai, Kouichi; Miyazaki, Shingo}, An anonymous electronic bidding protocol based on a new convertible group signature scheme. On the importance of hiding the winner's identity against bid-rigging, 385-399 [Zbl 0963.94519] \textit{Lee, KookHeui; Moon, SangJae}, AKA protocols for mobile communications, 400-411 [Zbl 0963.94510] \textit{Viswanathan, Kapali; Boyd, Colin; Dawson, Ed}, A three phased schema for sealed bid auction system design, 412-426 [Zbl 0963.94509] \textit{Nguyen, Khanh Quoc; Traoré, Jacques}, An online public auction protocol protecting bidder privacy, 427-442 [Zbl 0963.94512] \textit{King, Brian}, Algorithms to speed up computations in threshold RSA, 443-456 [Zbl 0963.94029] \textit{Brickell, Ernie; Di Crescenzo, Giovanni; Frankel, Yair}, Sharing block ciphers, 457-470 [Zbl 0963.94031] \textit{Blakley, Bob; Blakley, G. R.}, All sail, no anchor. I: Cryptography, risk, and e-commerce, 471-476 [Zbl 0963.68594] \textit{Underwood, Alan}, Professional ethics in a security and privacy context -- the perspective of a national computing society, 477-486 [Zbl 0963.68639]
0 references
Brisbane (Australia)
0 references
Proceedings
0 references
Conference
0 references
ACISP
0 references
Information security
0 references
Privacy
0 references