skip to content
Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings. Preview this item
ClosePreview this item
Checking...

Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings.

Author: Vijay Varadharajan; Josef Pieprzyk; Huaxiong Wang; ACISP 2004,
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2004.
Series: Lecture notes in computer science, 3108.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13-15 July, 2004. The conference was sponsored by the Centre for Advanced Computing - Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- versity and the Australian Computer Society. Theaimsoftheconferencearetobringtogetherresearchersandpractitioners working in  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference papers and proceedings
Electronic books
Congresses
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Vijay Varadharajan; Josef Pieprzyk; Huaxiong Wang; ACISP 2004,
ISBN: 3540223797 9783540223795
OCLC Number: 990754474
Language Note: English.
Notes: Bibliographic Level Mode of Issuance: Monograph.
Description: 1 online resource (XIV, 498 pages).
Contents: Broadcast Encryption and Traitor Tracing --
Multi-service Oriented Broadcast Encryption --
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme --
Linear Code Implies Public-Key Traitor Tracing with Revocation --
TTS without Revocation Capability Secure Against CCA2 --
Private Information Retrieval and Oblivious Transfer --
Single Database Private Information Retrieval with Logarithmic Communication --
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions --
Trust and Secret Sharing --
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing --
NGSCB: A Trusted Open System --
Cryptanalysis (I) --
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers --
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2 --
The Related-Key Rectangle Attack --
Application to SHACAL-1 --
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 --
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders --
Cryptanalysis (II) --
Analysis of a Conference Scheme Under Active and Passive Attacks --
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols --
Analysis and Improvement of Micali's Fair Contract Signing Protocol --
Digital Signatures (I) --
Digital Signature Schemes with Domain Parameters --
Generic Construction of Certificateless Signature --
Cryptosystems (I) --
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model --
How to Re-use Round Function in Super-Pseudorandom Permutation --
How to Remove MAC from DHIES --
Symmetric Key Authentication Services Revisited --
Fast Computation --
Improvements to the Point Halving Algorithm --
Theoretical Analysis of XL over Small Fields --
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks --
Mobile Agents Security --
A Mobile Agent System Providing Offer Privacy --
Digital Signatures (II) --
Identity-Based Strong Designated Verifier Signature Schemes --
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups --
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups --
Convertible Nominative Signatures --
Protocols --
Protocols with Security Proofs for Mobile Applications --
Secure Bilinear Diffie-Hellman Bits --
Weak Property of Malleability in NTRUSign --
Security Management --
Information Security Risk Assessment, Aggregation, and Mitigation --
Access Control and Authorisation --
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution --
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems --
Cryptosystems (II) --
Unconditionally Secure Encryption Under Strong Attacks --
ManTiCore: Encryption with Joint Cipher-State Authentication --
Cryptanalysis (III) --
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks --
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks --
Fault Attacks on Signature Schemes.
Series Title: Lecture notes in computer science, 3108.

Abstract:

The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13-15 July, 2004. The conference was sponsored by the Centre for Advanced Computing - Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- versity and the Australian Computer Society. Theaimsoftheconferencearetobringtogetherresearchersandpractitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The - viewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia,?ve each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. ThisyeartheprogramcommitteeintroducedtheBestStudentPaperAward. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/990754474> # Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings.
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "990754474" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4915555460#Topic/privacy_right_of> ; # Privacy, Right of
    schema:about <http://experiment.worldcat.org/entity/work/data/4915555460#Topic/data_protection> ; # Data protection
    schema:about <http://experiment.worldcat.org/entity/work/data/4915555460#Topic/computer_security> ; # Computer security
    schema:about <http://dewey.info/class/005.8/> ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4915555460#Person/wang_huaxiong> ; # Huaxiong Wang
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4915555460#Person/pieprzyk_josef> ; # Josef Pieprzyk
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4915555460#Meeting/acisp_2004> ; # ACISP 2004.
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4915555460#Person/varadharajan_vijay> ; # Vijay Varadharajan
    schema:creator <http://experiment.worldcat.org/entity/work/data/4915555460#Organization/acisp_2004> ; # ACISP 2004,
    schema:datePublished "2004" ;
    schema:description "The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13-15 July, 2004. The conference was sponsored by the Centre for Advanced Computing - Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- versity and the Australian Computer Society. Theaimsoftheconferencearetobringtogetherresearchersandpractitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The - viewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia,?ve each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. ThisyeartheprogramcommitteeintroducedtheBestStudentPaperAward. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication."@en ;
    schema:description "Broadcast Encryption and Traitor Tracing -- Multi-service Oriented Broadcast Encryption -- Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme -- Linear Code Implies Public-Key Traitor Tracing with Revocation -- TTS without Revocation Capability Secure Against CCA2 -- Private Information Retrieval and Oblivious Transfer -- Single Database Private Information Retrieval with Logarithmic Communication -- Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions -- Trust and Secret Sharing -- Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing -- NGSCB: A Trusted Open System -- Cryptanalysis (I) -- The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers -- Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2 -- The Related-Key Rectangle Attack -- Application to SHACAL-1 -- Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 -- The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders -- Cryptanalysis (II) -- Analysis of a Conference Scheme Under Active and Passive Attacks -- Cryptanalysis of Two Password-Authenticated Key Exchange Protocols -- Analysis and Improvement of Micali's Fair Contract Signing Protocol -- Digital Signatures (I) -- Digital Signature Schemes with Domain Parameters -- Generic Construction of Certificateless Signature -- Cryptosystems (I) -- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model -- How to Re-use Round Function in Super-Pseudorandom Permutation -- How to Remove MAC from DHIES -- Symmetric Key Authentication Services Revisited -- Fast Computation -- Improvements to the Point Halving Algorithm -- Theoretical Analysis of XL over Small Fields -- A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks -- Mobile Agents Security -- A Mobile Agent System Providing Offer Privacy -- Digital Signatures (II) -- Identity-Based Strong Designated Verifier Signature Schemes -- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups -- A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups -- Convertible Nominative Signatures -- Protocols -- Protocols with Security Proofs for Mobile Applications -- Secure Bilinear Diffie-Hellman Bits -- Weak Property of Malleability in NTRUSign -- Security Management -- Information Security Risk Assessment, Aggregation, and Mitigation -- Access Control and Authorisation -- A Weighted Graph Approach to Authorization Delegation and Conflict Resolution -- Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems -- Cryptosystems (II) -- Unconditionally Secure Encryption Under Strong Attacks -- ManTiCore: Encryption with Joint Cipher-State Authentication -- Cryptanalysis (III) -- On Security of XTR Public Key Cryptosystems Against Side Channel Attacks -- On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks -- Fault Attacks on Signature Schemes."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4915555460> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4915555460#Series/lecture_notes_in_computer_science_information_security_and_privacy> ; # Lecture notes in computer science Information security and privacy
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:name "Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings."@en ;
    schema:productID "990754474" ;
    schema:url <http://link.springer.com/10.1007/b98755> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-540-22379-5> ;
    schema:workExample <http://worldcat.org/isbn/9783540223795> ;
    schema:workExample <http://dx.doi.org/10.1007/b98755> ;
    umbel:isLike <http://d-nb.info/971634025> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/990754474> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4915555460#Person/pieprzyk_josef> # Josef Pieprzyk
    a schema:Person ;
    schema:familyName "Pieprzyk" ;
    schema:givenName "Josef" ;
    schema:name "Josef Pieprzyk" ;
    .

<http://experiment.worldcat.org/entity/work/data/4915555460#Person/varadharajan_vijay> # Vijay Varadharajan
    a schema:Person ;
    schema:familyName "Varadharajan" ;
    schema:givenName "Vijay" ;
    schema:name "Vijay Varadharajan" ;
    .

<http://experiment.worldcat.org/entity/work/data/4915555460#Person/wang_huaxiong> # Huaxiong Wang
    a schema:Person ;
    schema:familyName "Wang" ;
    schema:givenName "Huaxiong" ;
    schema:name "Huaxiong Wang" ;
    .

<http://experiment.worldcat.org/entity/work/data/4915555460#Series/lecture_notes_in_computer_science_information_security_and_privacy> # Lecture notes in computer science Information security and privacy
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/990754474> ; # Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings.
    schema:name "Lecture notes in computer science Information security and privacy" ;
    .

<http://experiment.worldcat.org/entity/work/data/4915555460#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4915555460#Topic/privacy_right_of> # Privacy, Right of
    a schema:Intangible ;
    schema:name "Privacy, Right of"@en ;
    .

<http://link.springer.com/10.1007/b98755>
    rdfs:comment "Springer Lecture Notes in Computer Science" ;
    .

<http://worldcat.org/isbn/9783540223795>
    a schema:ProductModel ;
    schema:isbn "3540223797" ;
    schema:isbn "9783540223795" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/990754474> ; # Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings.
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    .

<http://www.worldcat.org/title/-/oclc/990754474>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/990754474> ; # Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings.
    schema:dateModified "2018-09-08" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.