skip to content
Information Security and Privacy : 4th Australasian Conference, ACISP'99 Wollongong, NSW, Australia, April 7-9, 1999 Proceedings Preview this item
ClosePreview this item
Checking...

Information Security and Privacy : 4th Australasian Conference, ACISP'99 Wollongong, NSW, Australia, April 7-9, 1999 Proceedings

Author: Josef Pieprzyk; Reihanah Safavi-Naini; Jennifer Seberry
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1999.
Series: Lecture notes in computer science, 1587.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP'99, held in Wollongong, NSW, Australia in April 1999. The 26 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The book is divided in topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Printed edition:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Josef Pieprzyk; Reihanah Safavi-Naini; Jennifer Seberry
ISBN: 9783540489702 3540489703 9783540657569 3540657568
OCLC Number: 993758859
Description: 1 online resource (XII, 332 pages) : online resource.
Contents: Boolean Functions --
Boolean Function Design Using Hill Climbing Methods --
Enumeration of Correlation Immune Boolean Functions --
On the Symmetric Property of Homogeneous Boolean Functions --
Key Management --
Publicly Verifiable Key Escrow with Limited Time Span --
Accelerating Key Establishment Protocols for Mobile Communication --
Conference Key Agreement from Secret Sharing --
Cryptanalysis --
On m-Permutation Protection Scheme against Modification Attack --
Inversion Attack and Branching --
Signatures --
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves --
Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature --
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes --
RSA Cryptosystems --
On the Security of an RSA Based Encryption Scheme --
Generalised Cycling Attacks on RSA and Strong RSA Primes --
RSA Acceleration with Field Programmable Gate Arrays --
Group Cryptography --
Changing Thresholds in the Absence of Secure Channels --
A Self-Certified Group-Oriented Cryptosystem without a Combiner --
Network Security --
Companion Viruses and the Macintosh: Threats and Countermeasures --
An Implementation of a Secure Version of NFS Including RBAC --
Electronic Commerce --
Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems --
Effient Electronic Cash Using Batch Signatures --
Evolution of Fair Non-repudiation with TTP --
Access Control --
Authorization in Object Oriented Databases --
An Analysis of Access Control Models --
Odds and Ends --
Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems --
Characterization of Optimal Authentication Codes with Arbitration --
A Functional Cryptosystem Using a Group Action.
Series Title: Lecture notes in computer science, 1587.
Responsibility: edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry.

Abstract:

This book constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP'99, held in Wollongong, NSW, Australia in April 1999. The 26 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The book is divided in topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, electronic commerce, address control, and odds and ends.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/993758859> # Information Security and Privacy : 4th Australasian Conference, ACISP'99 Wollongong, NSW, Australia, April 7-9, 1999 Proceedings
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "993758859" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4535706637#Topic/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/4535706637#Topic/operating_systems_computers> ; # Operating systems (Computers)
    schema:about <http://experiment.worldcat.org/entity/work/data/4535706637#Topic/computer_software> ; # Computer software
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4535706637#Topic/algorithms> ; # Algorithms
    schema:about <http://experiment.worldcat.org/entity/work/data/4535706637#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://experiment.worldcat.org/entity/work/data/4535706637#Topic/computer_science> ; # Computer science
    schema:bookFormat schema:EBook ;
    schema:datePublished "1999" ;
    schema:description "Boolean Functions -- Boolean Function Design Using Hill Climbing Methods -- Enumeration of Correlation Immune Boolean Functions -- On the Symmetric Property of Homogeneous Boolean Functions -- Key Management -- Publicly Verifiable Key Escrow with Limited Time Span -- Accelerating Key Establishment Protocols for Mobile Communication -- Conference Key Agreement from Secret Sharing -- Cryptanalysis -- On m-Permutation Protection Scheme against Modification Attack -- Inversion Attack and Branching -- Signatures -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature -- Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes -- RSA Cryptosystems -- On the Security of an RSA Based Encryption Scheme -- Generalised Cycling Attacks on RSA and Strong RSA Primes -- RSA Acceleration with Field Programmable Gate Arrays -- Group Cryptography -- Changing Thresholds in the Absence of Secure Channels -- A Self-Certified Group-Oriented Cryptosystem without a Combiner -- Network Security -- Companion Viruses and the Macintosh: Threats and Countermeasures -- An Implementation of a Secure Version of NFS Including RBAC -- Electronic Commerce -- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems -- Effient Electronic Cash Using Batch Signatures -- Evolution of Fair Non-repudiation with TTP -- Access Control -- Authorization in Object Oriented Databases -- An Analysis of Access Control Models -- Odds and Ends -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems -- Characterization of Optimal Authentication Codes with Arbitration -- A Functional Cryptosystem Using a Group Action."@en ;
    schema:description "This book constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP'99, held in Wollongong, NSW, Australia in April 1999. The 26 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The book is divided in topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, electronic commerce, address control, and odds and ends."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/4535706637#Person/pieprzyk_josef> ; # Josef Pieprzyk
    schema:editor <http://experiment.worldcat.org/entity/work/data/4535706637#Person/safavi_naini_reihanah> ; # Reihanah Safavi-Naini
    schema:editor <http://experiment.worldcat.org/entity/work/data/4535706637#Person/seberry_jennifer> ; # Jennifer Seberry
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4535706637> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/4535706637#CreativeWork/> ;
    schema:name "Information Security and Privacy : 4th Australasian Conference, ACISP'99 Wollongong, NSW, Australia, April 7-9, 1999 Proceedings"@en ;
    schema:productID "993758859" ;
    schema:url <http://dx.doi.org/10.1007/3-540-48970-3> ;
    schema:workExample <http://worldcat.org/isbn/9783540489702> ;
    schema:workExample <http://worldcat.org/isbn/9783540657569> ;
    schema:workExample <http://dx.doi.org/10.1007/3-540-48970-3> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/993758859> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4535706637#Person/pieprzyk_josef> # Josef Pieprzyk
    a schema:Person ;
    schema:familyName "Pieprzyk" ;
    schema:givenName "Josef" ;
    schema:name "Josef Pieprzyk" ;
    .

<http://experiment.worldcat.org/entity/work/data/4535706637#Person/safavi_naini_reihanah> # Reihanah Safavi-Naini
    a schema:Person ;
    schema:familyName "Safavi-Naini" ;
    schema:givenName "Reihanah" ;
    schema:name "Reihanah Safavi-Naini" ;
    .

<http://experiment.worldcat.org/entity/work/data/4535706637#Person/seberry_jennifer> # Jennifer Seberry
    a schema:Person ;
    schema:familyName "Seberry" ;
    schema:givenName "Jennifer" ;
    schema:name "Jennifer Seberry" ;
    .

<http://experiment.worldcat.org/entity/work/data/4535706637#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4535706637#Topic/computer_software> # Computer software
    a schema:Intangible ;
    schema:name "Computer software"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4535706637#Topic/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4535706637#Topic/operating_systems_computers> # Operating systems (Computers)
    a schema:Intangible ;
    schema:name "Operating systems (Computers)"@en ;
    .

<http://worldcat.org/entity/work/data/4535706637#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/993758859> ; # Information Security and Privacy : 4th Australasian Conference, ACISP'99 Wollongong, NSW, Australia, April 7-9, 1999 Proceedings
    .

<http://worldcat.org/isbn/9783540489702>
    a schema:ProductModel ;
    schema:isbn "3540489703" ;
    schema:isbn "9783540489702" ;
    .

<http://worldcat.org/isbn/9783540657569>
    a schema:ProductModel ;
    schema:isbn "3540657568" ;
    schema:isbn "9783540657569" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/993758859> ; # Information Security and Privacy : 4th Australasian Conference, ACISP'99 Wollongong, NSW, Australia, April 7-9, 1999 Proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture Notes in Computer Science," ;
    .

<http://www.worldcat.org/title/-/oclc/993758859>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/993758859> ; # Information Security and Privacy : 4th Australasian Conference, ACISP'99 Wollongong, NSW, Australia, April 7-9, 1999 Proceedings
    schema:dateModified "2017-10-13" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.