program,andallthesessionchairsandspeakersfortheirtimeande?ort. Special thanks to Yi Mu, Laura Olsen, Rajan Shankaran, and Michael Hitchens for theirhelpwithlocalorganizationdetails. Finally,Iwouldliketothankallthe authorswhosubmittedpapersandalltheparticipantsofACISP2001. Ihope thattheprofessionalcontactsmadeatthisconference,thepresentations,and theproceedingshaveo?eredyouinsightsandideasthatyoucanapplytoyour owne?ortsinsecurityandprivacy. July2001 VijayVaradharajan AUSTRALASIANCONFERENCEON INFORMATIONSECURITYANDPRIVACY ACISP2001 Sponsoredby MacquarieUniversity AustralianComputerSociety General Chair: VijayVaradharajan MacquarieUniversity,Australia Program Chairs: VijayVaradharajan MacquarieUniversity,Australia YiMu MacquarieUniversity,Australia Program Committee: RossAnderson CambridgeUniversity,UK ColinBoyd QueenslandUniversityofTechnology,Australia EdDawson QueenslandUniversityofTechnology,Australia YvoDesmedt FloridaStateUniversity,USA PaulEngland Microsoft YairFrankel ColumbiaUniversity,USA AjoyGhosh UNISYS,Australia DieterGollman Microsoft JohnGordon ConceptLabs,UK KwangjoKim ICU,Korea ChuchangLiu DSTO,Australia MasahiroMambo TohokuUniversity,Japan WenboMao Hewlett-PackardLab. ,UK ChrisMitchell LondonUniversity,UK EijiOkamoto UniversityofWisconsin,USA JoePato Hewlett-PackardLab. ,USA JosefPieprzyk MacquarieUniversity,Australia BartPreneel KatholiekeUniversity,Belgium SteveRoberts WithamPtyLtd,Australia QingSihan AcademyofScience,China ReiSafavi-Naini UniversityofWollongong,Australia JenniferSeberry UniversityofWollongong,Australia YuliangZheng MonashUniversity,Australia TableofContents AFewThoughtsonE-Commerce. 1 YacovYacobi NewCBC-MACForgeryAttacks. 3 KarlBrincat,ChrisJ. Mitchell CryptanalysisofaPublicKeyCryptosystemProposedatACISP2000. 15 AmrYoussef,GuangGong ImprovedCryptanalysisoftheSelf-ShrinkingGenerator. 21 ErikZenner,MatthiasKrause,StefanLucks AttacksBasedonSmallFactorsinVariousGroupStructures. 36 ChrisPavlovski,ColinBoyd OnClassifyingConferenceKeyDistributionProtocols. 51 ShahrokhSaeednia,ReiSafavi-Naini,WillySusilo PseudorandomnessofMISTY-TypeTransformationsandtheBlockCipher KASUMI. 60 Ju-SungKang,OkyeonYi,DowonHong,HyunsookCho NewPublic-KeyCryptosystemUsingDivisorClassGroups. 74 HwankooKim,SangJaeMoon FirstImplementationofCryptographicProtocolsBasedonAlgebraic NumberFields. 84 AndreasMeyer,StefanNeis,ThomasPfahler PracticalKeyRecoverySchemes. 104 Sung-MingYen Non-deterministicProcessors. 115 DavidMay,HenkL. Muller,NigelP. Smart PersonalSecureBooting. 130 NaomaruItoi,WilliamA. Arbaugh,SamuelaJ. Pollack, DanielM. Reeves EvaluationofTamper-ResistantSoftwareDeviatingfromStructured ProgrammingRules. 145 HideakiGoto,MasahiroMambo,HirokiShizuya,YasuyoshiWatanabe AStrategyforMLSWork?ow. 159 VladIngarWietrzyk,MakotoTakizawa,VijayVaradharajan X TableofContents Condition-DrivenIntegrationofSecurityServices. 176 Cli?ordNeumann SKETHIC:SecureKernelExtensionagainstTrojanHorseswith Information-CarryingCodes. 177 Eun-SunCho,SunhoHong,SechangOh,Hong-JinYeh,ManpyoHong, Cheol-WonLee,HyundongPark,Chun-SikPark SecureandPrivateDistributionofOnlineVideoandSomeRelated CryptographicIssues. 190 FengBao,RobertDeng,PeirongFeng,YanGuo,HongjunWu PrivateInformationRetrievalBasedontheSubgroupMembership Problem. 206 AkihiroYamamura,TaiichiSaito APracticalEnglishAuctionwithOne-TimeRegistration. 221 KazumasaOmote,AtsukoMiyaji AUserAuthenticationSchemewithIdentityandLocationPrivacy. 235 ShouichiHirose,SusumuYoshida AnEnd-to-EndAuthenticationProtocolinWirelessApplicationProtocol. 247 Jong-PhilYang,WeonShin,Kyung-HyuneRhee ErrorDetectionandAuthenticationinQuantumKeyDistribution. 260 AkihiroYamamura,HirokazuIshizuka AnAxiomaticBasisforReasoningaboutTrustinPKIs. 274 ChuchangLiu,MarisOzols,TonyCant AKnowledge-BasedApproachtoInternetAuthorizations. 292 AlongLin ApplicationsofTrustedReviewtoInformationSecurity. 305 JohnYesberg,MarieHenderson NetworkSecurityModelingandCyberAttackSimulationMethodology. 320 Sung-DoChi,JongSouPark,Ki-ChanJung,Jang-SeLee CryptographicSalt:ACountermeasureagainstDenial-of-ServiceAttacks. 334 DongGookPark,JungJoonKim,ColinBoyd,EdDawson EnhancedModesofOperationfortheEncryptioninHigh-SpeedNetworks andTheirImpactonQoS.
Produkteigenschaften
- Artikelnummer: 9783540423003
- Medium: Buch
- ISBN: 978-3-540-42300-3
- Verlag: Springer Berlin Heidelberg
- Erscheinungstermin: 27.06.2001
- Sprache(n): Englisch
- Auflage: 2001
- Serie: Lecture Notes in Computer Science
- Produktform: Kartoniert
- Gewicht: 1650 g
- Seiten: 522
- Format (B x H x T): 155 x 235 x 29 mm
- Ausgabetyp: Kein, Unbekannt
Themen
- Mathematik | Informatik
- EDV | Informatik
- Technische Informatik
- Computersicherheit
- Datensicherheit, Datenschutz
- Sozialwissenschaften
- Medien- und Kommunikationswissenschaften
- Kommunikationswissenschaften
- Digitale Medien, Internet, Telekommunikation
- Interdisziplinäres
- Wissenschaften
- Wissenschaften: Forschung und Information
- Informationstheorie, Kodierungstheorie
- Mathematik | Informatik
- EDV | Informatik
- Technische Informatik
- Computersicherheit
- Kryptographie, Datenverschlüsselung
- Interdisziplinäres
- Wissenschaften
- Wissenschaften: Forschung und Information
- Informationstheorie, Kodierungstheorie
- Mathematik | Informatik
- EDV | Informatik
- Technische Informatik
- Computersicherheit
- Datensicherheit, Datenschutz