Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4--6, 2005. Proceedings. (Q2574753)

From MaRDI portal





scientific article
Language Label Description Also known as
English
Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4--6, 2005. Proceedings.
scientific article

    Statements

    Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4--6, 2005. Proceedings. (English)
    0 references
    2 December 2005
    0 references
    The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1053.94002). Indexed articles: \textit{Blakley, Bob; Blakley, G. R.}, All sail, no anchor. III: Risk aggregation and time's arrow, 1-16 [Zbl 1127.68484] \textit{Tschofenig, Hannes; Gurtov, Andrei; Ylitalo, Jukka; Nagarajan, Aarthi; Shanmugam, Murugaraj}, Traversing middleboxes with the host identity protocol, 17-28 [Zbl 1127.68398] \textit{Pudney, Phillip; Slay, Jill}, An investigation of unauthorised use of wireless networks in Adelaide, South Australia, 29-39 [Zbl 1127.68395] \textit{Goyal, Vipul; Tripathy, Rohit}, An efficient solution to the ARP cache poisoning problem, 40-51 [Zbl 1127.68379] \textit{Contini, Scott; Shparlinski, Igor E.}, On Stern's attack against secret truncated linear congruential generators, 52-60 [Zbl 1127.94342] \textit{Miyaji, Atsuko; Takano, Yuuki}, On the success probability of \(\chi^{2}\)-attack on RC6, 61-74 [Zbl 1127.68392] \textit{Paul, Souradyuti; Preneel, Bart}, Solving systems of differential equations of addition (extended abstract), 75-88 [Zbl 1127.94354] \textit{Asano, Tomoyuki; Kamio, Kazuya}, A tree based one-key broadcast encryption scheme with low computational overhead, 89-100 [Zbl 1127.94337] \textit{Dutta, Ratna; Barua, Rana}, Dynamic group key agreement in tree-based setting (extended abstract), 101-112 [Zbl 1127.94365] \textit{Wong, C. K.; Chan, Agnes}, Immediate data authentication for multicast in resource constrained network, 113-121 [Zbl 1127.94377] \textit{Doche, Christophe}, Redundant trinomials for finite fields of characteristic 2, 122-133 [Zbl 1127.94344] \textit{Kwon, Soonhak}, Efficient Tate pairing computation for elliptic curves over binary fields, 134-145 [Zbl 1127.94348] \textit{Kitamura, Izuru; Katagi, Masanobu; Takagi, Tsuyoshi}, A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two, 146-157 [Zbl 1127.94347] \textit{Yao, Min; Peng, Kun; Dawson, Ed}, Using ``Fair forfeit'' to prevent truncation attacks on mobile agents, 158-169 [Zbl 1127.68401] \textit{Giansiracusa, Michelangelo; Russell, Selwyn; Clark, Andrew; Hynd, John}, An improved execution integrity solution for mobile agents, 170-183 [Zbl 1127.68378] \textit{Rieback, Melanie R.; Crispo, Bruno; Tanenbaum, Andrew S.}, RFID guardian: a battery-powered mobile device for RFID privacy management, 184-194 [Zbl 1127.68396] \textit{Lv, Jiqiang; Han, Yongfei}, Enhanced DES implementation secure against high-order differential power analysis in smartcards, 195-206 [Zbl 1127.68388] \textit{Bevan, Régis}, Improved zero value attack on XTR, 207-217 [Zbl 1127.94339] \textit{Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille}, Efficient representations on Koblitz curves with resistance to side channel attacks, 218-229 [Zbl 1127.94353] \textit{McComb, Tim; Wildman, Luke}, SIFA: a tool for evaluation of high-grade security devices, 230-241 [Zbl 1127.68390] \textit{Ang, Russell; Safavi-Naini, Rei; McAven, Luke}, Cancelable key-based fingerprint templates, 242-252 [Zbl 1127.94357] \textit{Dent, Alexander W.}, Hybrid signcryption schemes with insider security, 253-266 [Zbl 1127.94363] \textit{Lenstra, Arjen; de Weger, Benne}, On the possibility of constructing meaningful hash collisions for public keys, 267-279 [Zbl 1127.94349] \textit{Galbraith, Steven D.; Heneghan, Chris; McKee, James F.}, Tunable balancing of RSA, 280-292 [Zbl 1127.94346] \textit{Li, Celia; Yang, Cungang; Cheung, Richard}, Key management for role hierarchy in distributed systems, 293-302 [Zbl 1127.94350] \textit{Wang, Shujing; Zhang, Yan}, A formalization of distributed authorization with delegation, 303-315 [Zbl 1127.94374] \textit{Chow, Sherman S. M.; Hui, Lucas C. K.; Yiu, S. M.; Chow, K. P.}, Two improved partially blind signature schemes from bilinear pairings, 316-328 [Zbl 1127.94362] \textit{Susilo, Willy; Mu, Yi}, On the security of nominative signatures, 329-335 [Zbl 1127.94373] \textit{McCullagh, Adrian; Caelli, William}, Who goes there? Internet banking: a matter of risk and reward, 336-357 [Zbl 1127.68391] \textit{Lui, Richard W. C.; Chow, Sherman S. M.; Hui, Lucas C. K.; Yiu, S. M.}, Role activation management in role based access control, 358-369 [Zbl 1127.68387] \textit{Jin, Hai; Qiang, Weizhong; Shi, Xuanhua; Zou, Deqing}, VO-Sec: an access control framework for dynamic virtual organization, 370-381 [Zbl 1127.68382] \textit{King, Brian}, An efficient implementation of a threshold RSA signature scheme, 382-393 [Zbl 1127.94369] \textit{Steketee, Chris; Brown, Jaimee; González Nieto, Juan M.; Montague, Paul}, GBD threshold cryptography with an application to RSA key recovery, 394-405 [Zbl 1127.94355] \textit{Isshiki, Toshiyuki; Tanaka, Keisuke}, An \((n-t)\)-out-of-\(n\) threshold ring signature scheme, 406-416 [Zbl 1127.94368] \textit{Yang, Guomin; Wong, Duncan S.; Deng, Xiaotie}, Deposit-case attack against secure roaming, 417-428 [Zbl 1127.94378] \textit{Choo, Kim-Kwang Raymond; Hitchcock, Yvonne}, Security requirements for key establishment proof models: revisiting Bellare-Rogaway and Jeong-Katz-Lee protocols, 429-442 [Zbl 1127.94361] \textit{Nakanishi, Toru; Kubooka, Fumiaki; Hamada, Naoto; Funabiki, Nobuo}, Group signature schemes with membership revocation for large groups, 443-454 [Zbl 1127.94371] \textit{Furukawa, Jun; Imai, Hideki}, An efficient group signature scheme from bilinear maps, 455-467 [Zbl 1127.94366] \textit{Wei, Victor K.; Yuen, Tsz Hon; Zhang, Fangguo}, Group signature where group manager, members and open authority are identity-based, 468-480 [Zbl 1127.94376] \textit{Aura, Tuomas; Nagarajan, Aarthi; Gurtov, Andrei}, Analysis of the HIP base exchange protocol, 481-493 [Zbl 1127.68373] \textit{Choi, Kyu Young; Hwang, Jung Yeon; Lee, Dong Hoon; Seo, In Seog}, ID-based authenticated key agreement for low-power mobile devices, 494-505 [Zbl 1127.94360] \textit{Guo, Xingyang; Zhang, Quan; Tang, Chaojing}, On the security of two key-updating signature schemes, 506-517 [Zbl 1127.94367] \textit{Yang, Bo-Yin; Chen, Jiun-Ming}, Building secure tame-like multivariate public-key cryptosystems: the new TTS, 518-531 [Zbl 1127.94356] \textit{Desmedt, Yvo}, Potential impacts of a growing gap between theory and practice in information security, 532-536 [Zbl 1127.94343] \textit{Yang, Yanjiang; Bao, Feng; Deng, Robert H.}, Security analysis and fix of an anonymous credential system, 537-547 [Zbl 1127.94380] \textit{Bicakci, Kemal; Crispo, Bruno; Tanenbaum, Andrew S.}, Counting abuses using flexible off-line credentials, 548-559 [Zbl 1127.94359] \textit{Mitchell, Chris J.}, Cryptanalysis of two variants of PCBC mode when used for message integrity, 560-571 [Zbl 1127.94352] \textit{Millan, William L.}, New cryptographic applications of Boolean function equivalence classes, 572-583 [Zbl 1127.94351]
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references