+612 9045 4394
Information Security and Privacy : Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings - Vijav Varadharajan

Information Security and Privacy

Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings

By: Vijav Varadharajan (Editor), Josef Pieprzyk (Editor), Yi Mu (Editor)

Paperback Published: 25th June 1997
ISBN: 9783540632320
Number Of Pages: 343

Share This Book:


or 4 easy payments of $31.26 with Learn more
Ships in 5 to 9 business days

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Keynote Lecture: Trusted third parties for secure electronic commerce - Are they needed?p. 1
Prospectives for modelling trust in information securityp. 2
Analysis and implementation of a formal authorisation policy design approachp. 14
An approach to dynamic domain and type enforcementp. 26
Purpose-oriented access control model in object-based systemsp. 38
User access domain management system - ADAMSp. 50
Revocation of unread email in an untrusted networkp. 62
Security issues in asynchronous transfer modep. 76
A method to implement a denial of service protection basep. 90
ProtectOS: Operating system and hardware support for small objectsp. 102
Practical memory checkers for stacks, queues and dequesp. 114
Panel Session: Cryptographic Policy Guidelinesp. 126
Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fieldsp. 127
A new hash function based on block cipherp. 139
New lower bounds on nonlinearity and a class of highly nonlinear functionsp. 147
On the security of self-synchronous ciphersp. 159
Inefficiency of variant characteristics for substitution-permutation networks with position permutationsp. 171
Secret sharing with reusable polynomialsp. 183
A message authentication code based on Latin squaresp. 194
Characterisation of (k, n) multi-receiver authenticationp. 204
Cryptanalysis of adaptive arithmetic coding encryption schemesp. 216
Fast correlation attacks and multiple linear approximationsp. 228
Verifiable escrowed signaturep. 240
Democratic key escrow schemep. 249
Design and analyses of two basic protocols for use in TTP-based key escrowp. 261
Protection of data and delegated keys in digital distributionp. 271
New micropayment schemes based on PayWordsp. 283
On key agreement and conference key agreementp. 294
Identity-based and self-certified key-exchange protocolsp. 303
Enabling technology for the trading of MPEG-encoded videop. 314
Image distribution method with embedded identifier scheme for copyright protectionp. 325
Author Indexp. 337
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540632320
ISBN-10: 3540632328
Series: Lecture Notes in Artificial Intelligence
Audience: General
Format: Paperback
Language: English
Number Of Pages: 343
Published: 25th June 1997
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 1.88
Weight (kg): 0.5