Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3--5, 2002. Proceedings (Q1613680)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3--5, 2002. Proceedings |
scientific article; zbMATH DE number 1793888
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3--5, 2002. Proceedings |
scientific article; zbMATH DE number 1793888 |
Statements
Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3--5, 2002. Proceedings (English)
0 references
1 September 2002
0 references
The articles of this volume will be reviewed individually. The preceding conference (6th, 2001) has been reviewed (see Zbl 0969.00103). Indexed articles: \textit{Biehl, Ingrid; Takagi, Tsuyoshi}, A new distributed primality test for shared RSA keys using quadratic fields, 1-16 [Zbl 1020.94533] \textit{Yang, Yanjiang; Bao, Feng; Deng, Robert H.}, Security analysis and improvement of the global key recovery system, 17-24 [Zbl 1020.94539] \textit{Clark, A.; Dawson, Ed; Fuller, J.; Golić, J.; Lee, H.-J.; Millan, William; Moon, S.-J.; Simpson, L.}, The LILI-II keystream generator, 25-39 [Zbl 1020.94514] \textit{Kurnio, Hartono; Safavi-Naini, Rei; Wang, Huaxiong}, A secure re-keying scheme with key recovery property, 40-55 [Zbl 1020.94536] \textit{Henderson, Marie; Coulter, Robert; Dawson, Ed; Okamoto, Eiji}, Modelling trust structures for public key infrastructures, 56-70 [Zbl 1020.94534] \textit{Barwick, S. G.; Jackson, W.-A.; Martin, Keith M.; Wild, Peter R.}, Size of broadcast in threshold schemes with disenrollment, 71-88 [Zbl 1020.94531] \textit{King, Brian}, Requirements for group independent linear threshold secret sharing schemes, 89-106 [Zbl 1020.94535] \textit{Bennett, Krista; Grothoff, Christian; Horozov, Tzvetan; Patrascu, Ioana}, Efficient sharing of encrypted data, 107-120 [Zbl 1020.94532] \textit{Pieprzyk, Josef; Zhang, Xian-Mo}, Cheating prevention in linear secret sharing, 121-135 [Zbl 1020.94537] \textit{Fischer, Wieland; Seifert, Jean-Pierre}, Note on fast computation of secret RSA exponents, 136-143 [Zbl 1020.94518] \textit{Reyzin, Leonid; Reyzin, Natan}, Better than BiBa: Short one-time signatures with fast signing and verifying, 144-153 [Zbl 1020.94538] \textit{Wu, Hongjun; Bao, Feng}, Cryptanalysis of stream cipher COS (2, 128) Mode I, 154-158 [Zbl 1020.94530] \textit{Soldera, David; Seberry, Jennifer; Qu, Chengxin}, The analysis of Zheng-Seberry scheme, 159-168 [Zbl 1015.68072] \textit{Wu, Hongjun}, Cryptanalysis of stream cipher Alpha1, 169-175 [Zbl 1020.94529] \textit{Hughes, James}, A linear algebraic attack on the AAFG1 braid group cryptosystem, 176-189 [Zbl 1022.94508] \textit{Choie, Y.; Yun, D.}, Isomorphism classes of hyperelliptic curves of genus 2 over \(\mathbb{F}_q\), 190-202 [Zbl 1022.11029] \textit{Zhang, Fangguo; Liu, Shengli; Kim, Kwangjo}, Compact representation of domain parameters of hyperelliptic curve cryptosystems, 203-213 [Zbl 1022.94510] \textit{Hitchcock, Yvonne; Montague, Paul}, A new elliptic curve scalar multiplication algorithm to resist simple power analysis, 214-225 [Zbl 1022.94507] \textit{May, Lauren; Henricksen, Matt; Millan, William; Carter, Gary; Dawson, Ed}, Strengthening the key schedule of the AES, 226-240 [Zbl 1015.68071] \textit{Steinfeld, Ron; Baek, Joonsang; Zheng, Yuliang}, On the necessity of strong assumptions for the security of a class of asymmetric encryption schemes, 241-256 [Zbl 1023.94537] \textit{Warren, M. J.; Batten, L. M.}, Security management: An information systems setting, 257-270 [Zbl 1015.68232] \textit{Ruan, Chun; Varadharajan, Vijay}, Resolving conflicts in authorization delegations, 271-285 [Zbl 1023.94543] \textit{Hitchens, M.; Varadharajan, Vijay; Saunders, G.}, Policy administration domains, 286-302 [Zbl 1015.68231] \textit{Zhou, Jianying}, Maintaining the validity of digital signatures in B2B applications, 303-315 [Zbl 1023.94544] \textit{Sebé, Francesc; Domingo-Ferrer, Josep}, Short 3-secure fingerprinting codes for copyright protection, 316-327 [Zbl 1023.94542] \textit{Tada, Mitsuru}, An order-specified multisignature scheme secure against active insider attacks, 328-345 [Zbl 1024.94521] \textit{England, Paul; Peinado, Marcus}, Authenticated operation of open computing devices, 346-361 [Zbl 1024.94517] \textit{Kim, Myungsun; Kim, Kwangjo}, A new identification scheme based on the bilinear Diffie-Hellman problem, 362-378 [Zbl 1025.94512] \textit{Roy, Bimal}, A brief outline of research on correlation immune functions, 379-394 [Zbl 1025.94508] \textit{Mu, Yi; Zhang, Junqi; Varadharajan, Vijay}, \(m\) out of \(n\) oblivious transfer, 395-405 [Zbl 1024.94515] \textit{Park, Sangwoo; Sung, Soo Hak; Chee, Seongtaek; Lim, Jongin}, On the security of reduced versions of 3-pass HAVAL, 406-419 [Zbl 1024.94513] \textit{Okeya, Katsuyuki; Sakurai, Kouichi}, On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling, 420-435 [Zbl 1024.94512] \textit{Sakurai, Kouichi; Takagi, Tsuyoshi}, On the security of a modified Paillier public-key primitive, 436-448 [Zbl 1024.94514] \textit{Cubaleska, Biljana; Qiu, Weidong; Schneider, Markus}, How to play Sherlock Holmes in the world of mobile agents, 449-463 [Zbl 1024.94516] \textit{Han, Dong-Guk; Park, Hye-Young; Park, Young-Ho; Lee, Sangjin; Lee, Dong Hoon; Yang, Hyung-Jin}, A practical approach defeating blackmailing, 464-481 [Zbl 1024.94518] \textit{Kim, Hyun-Jeong; Lee, Dong Hoon; Yung, Moti}, Privacy against piracy: Protecting two-level revocable P-K traitor tracing, 482-496 [Zbl 1024.94519] \textit{Ashwin Kumar, M. V. N.; Srinathan, K.; Pandu Rangan, C.}, Asynchronous perfectly secure computation tolerating generalized adversaries, 497-511 [Zbl 1024.94511]
0 references
Melbourne (Australia)
0 references
Proceedings
0 references
Conference
0 references
ACISP 2002
0 references
Information security
0 references
Privacy
0 references
Australasian conference
0 references