Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11--13, 2001. Proceedings (Q5943780)

From MaRDI portal





scientific article; zbMATH DE number 1648183
Language Label Description Also known as
English
Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11--13, 2001. Proceedings
scientific article; zbMATH DE number 1648183

    Statements

    Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11--13, 2001. Proceedings (English)
    0 references
    18 September 2001
    0 references
    The articles of this volume will be reviewed individually. The preceding conference (5th, 2000) has been reviewed (see Zbl 0941.00050). Indexed articles: \textit{Yacobi, Yacov}, A few thoughts on e-commerce. Keynote lecture, 1-2 [Zbl 0994.68543] \textit{Brincat, Karl; Mitchell, Chris J.}, New CBC-MAC forgery attacks, 3-14 [Zbl 0994.68558] \textit{Youssef, Amr; Gong, Guang}, Cryptanalysis of a public key cryptosystem proposed at ACISP 2000, 15-20 [Zbl 1005.94531] \textit{Zenner, Erik; Krause, Matthias; Lucks, Stefan}, Improved cryptanalysis of the self-shrinking generator, 21-35 [Zbl 1005.94533] \textit{Pavlovski, Chris; Boyd, Colin}, Attacks based on small factors in various group structures, 36-50 [Zbl 1004.94528] \textit{Saeednia, Shahrokh; Safavi-Naini, Rei; Susilo, Willy}, On classifying conference key distribution protocols, 51-59 [Zbl 1006.94530] \textit{Kang, Ju-Sung; Yi, Okyeon; Hong, Dowon; Cho, Hyunsook}, Pseudorandomness of MISTY-type transformations and the block cipher KASUMI, 60-73 [Zbl 1007.94538] \textit{Kim, Hwankoo; Moon, SangJae}, New public-key cryptosystem using divisor class groups, 74-83 [Zbl 1008.94539] \textit{Meyer, Andreas; Neis, Stefan; Pfahler, Thomas}, First implementation of cryptographic protocols based on algebraic number fields, 84-103 [Zbl 1005.94532] \textit{Yen, Sung-Ming}, Practical key recovery schemes, 104-114 [Zbl 1004.94533] \textit{May, David; Muller, Henk L.; Smart, Nigel P.}, Non-deterministic processors, 115-129 [Zbl 0994.68559] \textit{Itoi, Naomaru; Arbaugh, William A.; Pollack, Samuela J.; Reeves, Daniel M.}, Personal secure booting, 130-144 [Zbl 0994.68561] \textit{Goto, Hideaki; Mambo, Masahiro; Shizuya, Hiroki; Watanabe, Yasuyoshi}, Evaluation of tamper-resistant software deviating from structured programming rules, 145-158 [Zbl 0994.68565] \textit{Wietrzyk, Vlad Ingar; Takizawa, Makoto; Varadharajan, Vijay}, A strategy for MLS workflow, 159-175 [Zbl 0994.68546] \textit{Neumann, Clifford}, Condition-driven integration of security services. Keynote lecture, 176 [Zbl 0994.68550] \textit{Cho, Eun-Sun; Hong, Sunho; Oh, Sechang; Yeh, Hong-Jin; Hong, Manpyo}, SKETHIC: Secure kernel extension against Trojan horses with information-carrying codes, 177-189 [Zbl 0994.68502] \textit{Bao, Feng; Deng, Robert; Feng, Peirong; Guo, Yan; Wu, Hongjun}, Secure and private distribution of online video and some related cryptographic issues, 190-205 [Zbl 0994.68566] \textit{Yamamura, Akihiro; Saito, Taiichi}, Private information retrieval based on the subgroup membership problem, 206-220 [Zbl 0994.68501] \textit{Omote, Kazumasa; Miyaji, Atsuko}, A practical English auction with one-time registration, 221-234 [Zbl 0994.68545] \textit{Hirose, Shouichi; Yoshida, Susumu}, A user authentication scheme with identity and location privacy, 235-246 [Zbl 1006.94539] \textit{Yang, Jong-Phil; Shin, Weon; Rhee, Kyung-Hyune}, An end-to-end authentication protocol in wireless application protocol, 247-259 [Zbl 1007.94541] \textit{Yamamura, Akihiro; Ishizuka, Hirokazu}, Error detection and authentication in quantum key distribution, 260-273 [Zbl 1008.94547] \textit{Liu, Chuchang; Ozols, Maris; Cant, Tony}, An axiomatic basis for reasoning about trust in PKIs, 274-291 [Zbl 1008.94537] \textit{Lin, Along}, A knowledge-based approach to Internet authorizations, 292-304 [Zbl 0994.68544] \textit{Yesberg, John; Henderson, Marie}, Applications of trusted review to information security, 305-319 [Zbl 0994.68547] \textit{Chi, Sung-Do; Park, Jong Sou; Jung, Ki-Chan; Lee, Jang-Se}, Network security modeling and cyber attack simulation methodology, 320-333 [Zbl 0994.68557] \textit{Park, DongGook; Kim, JungJoon; Boyd, Colin; Dawson, Ed}, Cryptographic salt: A countermeasure against denial-of-service attacks, 334-343 [Zbl 0994.68551] \textit{Jung, Oliver; Kuhn, Sven; Ruland, Christoph; Wollenweber, Kai}, Enhanced modes of operation for the encryption in high-speed networks and their impact on QoS, 344-359 [Zbl 0994.68564] \textit{Ansper, Arne; Buldas, Ahto; Saarepera, Märt; Willemson, Jan}, Improving the availability of time-stamping services, 360-375 [Zbl 0994.68553] \textit{King, Brian}, Randomness required for linear threshold sharing schemes defined over any finite abelian group, 376-391 [Zbl 1007.94543] \textit{Ghodosi, Hossein; Pieprzyk, Josef}, Democratic systems, 392-402 [Zbl 1006.94541] \textit{Maeda, Ayako; Miyaji, Atsuko; Tada, Mitsuru}, Efficient and unconditionally secure verifiable threshold changeable scheme, 403-416 [Zbl 1005.94536] \textit{Stinson, Douglas R.; Strobl, Reto}, Provably secure distributed Schnorr signatures and a \((t,n)\) threshold scheme for implicit certificates, 417-434 [Zbl 1005.94538] \textit{Safavi-Naini, Rei; Susilo, Willy; Wang, Huaxiong}, How to construct fail-stop confirmer signature schemes, 435-444 [Zbl 1005.94537] \textit{Tan, Chik How; Yi, Xun; Siew, Chee Kheong}, Signature schemes based on 3rd order shift registers, 445-459 [Zbl 1004.94544] \textit{Nakanishi, Toru; Sugiyama, Yuji}, Anonymous statistical survey of attributes, 460-473 [Zbl 1006.94540] \textit{Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo}, Secure mobile agent using strong non-designated proxy signature, 474-486 [Zbl 0994.68562] \textit{Boyd, Colin; Montague, Paul; Nguyen, Khanh}, Elliptic curve based password authenticated key exchange protocols, 487-501 [Zbl 1007.94542] \textit{Weimerskirch, André; Paar, Christof; Shantz, Sheueling Chang}, Elliptic curve cryptography on a Palm OS device, 502-513 [Zbl 1008.94538] \textit{Shim, Kyungah}, Reducing certain elliptic curve discrete logarithms to logarithms in a finite field, 514-520 [Zbl 1008.94540]
    0 references
    Sydney (Australia)
    0 references
    Conference
    0 references
    Proceedings
    0 references
    ACISP 2001
    0 references
    Australasian conference
    0 references
    Information security
    0 references
    Privacy
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references