Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Security and Cryptology ;
3574 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Talk
- All Sail, No Anchor III: Risk Aggregation and Time's Arrow
- Network Security
- Traversing Middleboxes with the Host Identity Protocol
- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia
- An Efficient Solution to the ARP Cache Poisoning Problem
- Cryptanalysis
- On Stern's Attack Against Secret Truncated Linear Congruential Generators
- On the Success Probability of ? 2-attack on RC6
- Solving Systems of Differential Equations of Addition
- Group Communications
- A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead
- Dynamic Group Key Agreement in Tree-Based Setting
- Immediate Data Authentication for Multicast in Resource Constrained Network
- Elliptic Curve Cryptography
- Redundant Trinomials for Finite Fields of Characteristic 2
- Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields
- A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
- Mobile Security
- Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents
- An Improved Execution Integrity Solution for Mobile Agents
- RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
- Side Channel Attacks
- Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards
- Improved Zero Value Attack on XTR
- Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks
- Evaluation and Biometrics
- SIFA: A Tool for Evaluation of High-Grade Security Devices
- Cancelable Key-Based Fingerprint Templates
- Public Key Cryptosystems
- Hybrid Signcryption Schemes with Insider Security
- On the Possibility of Constructing Meaningful Hash Collisions for Public Keys
- Tunable Balancing of RSA
- Access Control I
- Key Management for Role Hierarchy in Distributed Systems
- A Formalization of Distributed Authorization with Delegation
- Signatures I
- Two Improved Partially Blind Signature Schemes from Bilinear Pairings
- On the Security of Nominative Signatures
- Invited Talk
- Who Goes There? Internet Banking: A Matter of Risk and Reward
- Access Control II
- Role Activation Management in Role Based Access Control
- VO-Sec: An Access Control Framework for Dynamic Virtual Organization
- Threshold Cryptography
- An Efficient Implementation of a Threshold RSA Signature Scheme
- GBD Threshold Cryptography with an Application to RSA Key Recovery
- An (n-t)-out-of-n Threshold Ring Signature Scheme
- Protocols I
- Deposit-Case Attack Against Secure Roaming
- Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols
- Group Signatures
- Group Signature Schemes with Membership Revocation for Large Groups
- An Efficient Group Signature Scheme from Bilinear Maps
- Group Signature Where Group Manager, Members and Open Authority Are Identity-Based
- Protocols II
- Analysis of the HIP Base Exchange Protocol
- ID-based Authenticated Key Agreement for Low-Power Mobile Devices
- Signatures II
- On the Security of Two Key-Updating Signature Schemes
- Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
- Invited Talk
- Potential Impacts of a Growing Gap Between Theory and Practice in Information Security
- Credentials
- Security Analysis and Fix of an Anonymous Credential System
- Counting Abuses Using Flexible Off-line Credentials
- Symmetric Cryptography
- Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity
- New Cryptographic Applications of Boolean Function Equivalence Classes.