+612 9045 4394
 
CHECKOUT
Information Security and Privacy : First Australasian Conference, Acisp '96, Wollongong, Nsw, Australia, June 24 - 26, 1996, Proceedings - Josef Pieprzyk

Information Security and Privacy

First Australasian Conference, Acisp '96, Wollongong, Nsw, Australia, June 24 - 26, 1996, Proceedings

By: Josef Pieprzyk (Editor), Jennifer Seberry (Editor)

Paperback

Published: 13th November 1996
Ships: 15 business days
15 business days
$125.05
or 4 easy payments of $31.26 with Learn more

Other Available Formats (Hide)

  • Paperback View Product Published: 15th June 2007
    Ships: 15 business days
    15 business days
    $181.29
  • Paperback View Product Published: 31st May 2017
    Ships: 15 business days
    15 business days
    $135.50
  • Paperback View Product Published: 17th March 1999
    Ships: 15 business days
    15 business days
    $135.51
  • Paperback View Product Published: 31st May 2017
    Ships: 15 business days
    15 business days
    $135.50

This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996.
The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.

The Changing Face of Information Technology Securityp. 1
Replicating the Kuperee authentication server for increased security and reliabilityp. 14
Non-repudiation without public-keyp. 27
Investigation of non-repudiation protocolsp. 38
A dynamic secret sharing scheme with cheater detectionp. 48
A nonlinear secret sharing schemep. 56
The access structure of some secret-sharing schemesp. 67
On construction of resilient functionsp. 79
Another approach to software key escrow encryptionp. 87
Cryptography based on transcendental numbersp. 96
Breakthroughs in Standardisation of IT Security Criteriap. 108
Tailoring authentication protocols to match underlying mechanismsp. 121
On the design of security protocols for mobile communicationsp. 134
A Framework for Design of Key Establishment Protocolsp. 146
On period of multiplexed sequencesp. 158
Edit distance correlation attacks on clock-controlled combiners with memoryp. 169
A faster cryptanalysis of the self-shrinking generatorp. 182
Modeling a multi-level secure object-oriented database using viewsp. 190
Support for joint action based security policiesp. 207
Access Control: The Neglected Frontierp. 219
On the quantitative assessment of behavioural securityp. 228
On the modelling of preventive security based on a PC network intrusion experimentp. 242
Evidential reasoning in network intrusion detection systemsp. 253
A group-oriented (t,n) undeniable signature scheme without trusted centerp. 266
Cryptosystems for hierarchical groupsp. 275
On selectable collisionful hash functionsp. 287
On password-based authenticated key exchange using collisionful hash functionsp. 299
A new universal test for bit stringsp. 311
An alternative model of quantum key agreement via photon couplingp. 320
Author Indexp. 333
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540619918
ISBN-10: 3540619917
Series: Lecture Notes in Artificial Intelligence
Audience: General
Format: Paperback
Language: English
Number Of Pages: 341
Published: 13th November 1996
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 1.85
Weight (kg): 0.49